Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

CYBER SECURITY FOR INDUSTRIAL CONTROL SYSTEMS: FROM THE VIEWPOINT OF CLOSE-LOOP
Título:
CYBER SECURITY FOR INDUSTRIAL CONTROL SYSTEMS: FROM THE VIEWPOINT OF CLOSE-LOOP
Subtítulo:
Autor:
CHENG, P
Editorial:
CRC PRESS
Año de edición:
2016
Materia
SEGURIDAD Y CRIPTOGRAFIA
ISBN:
978-1-4987-3473-8
Páginas:
315
156,00 €

 

Sinopsis

Features

Provides an extensive introduction to state-of-the-art cyber security theories and technologies from the viewpoint of close-loop
Identifies the quantitative characteristics of typical cyber attacks and analyzes the attack decision mechanisms in closed-loop industrial systems in depth
Proposes novel intrusion detection mechanisms against cyber attacks in industrial control systems
Presents a systematic understanding of the secure architectural design for industrial control systems
Addresses secure control approaches against cyber attacks for the representative applications in industrial control systems
Summary

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.

The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios.

The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.



Table of Contents

SECURE STATE ESTIMATION

A Game-Theoretic Approach to Jamming Attacks on Remote State Estimation in Cyber-Physical Systems
Yuzhe Li, Ling Shi, Peng Cheng, Jiming Chen, and Daniel E. Quevedo

Secure State Estimation against Stealthy Attack
Yilin Mo

Secure State Estimation in Industrial Control Systems
Arash Mohammadi and Konstantinos N. Plataniotis

RESILIENT CONTROL THEORY

Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems
Heng Zhang, Peng Cheng, Ling Shi, and Jiming Chen

Behavior Rule Specification-Based False Data Injection Detection Technique for Smart Grid
Beibei Li, Rongxing Lu, and Haiyong Bao

Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics, and Design Principles
Quanyan Zhu, Dong Wei, and Kun Ji

Topology Control in Secure Wireless Sensors Networks
Jun Zhao

Resilient Distributed Control in Cyber-Physical Energy Systems
Wente Zeng and Mo-Yuen Chow

SECURITY ISSUES IN APPLICATION FIELDS

Distributed Resilient Control of Operator-Vehicle Networks under Cyber Attacks
Minghui Zhu and Sonia Martinez

Privacy-Preserving Data Access Control in the Smart Grid
Kan Yang, Xiaohua Jia, and Xuemin (Sherman) Shen