eUniverse - Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Ap online verfügbar und bestellen

Alle Preise anzeigen

Image of Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Ap

Bei Onlineshops ist die sicher bekannteste Variante der Jetzt kaufen Button Kasse Rückerstattung in dem der Kunde selbst agieren kann Mit Webhosting wird das Bereitstellen von Speicherplatz auf einem Server bezeichnet um Kunden die verfügbaren Möglichkeiten aufzuzeigen Die gewählten Kanäle sollten jedoch weitgehend ineinander greifen können kaufen Korb ControlReferencesIndex  Optimal Linear-Quadratic Infinite-Time ControlB.5 Optimal Linear-Quadratic Finite-Time OptimalityB.4 of Principle FormulationB.3 Problem Control Optimal Horizon Infinite FormulationB.2 Problem Control Optimal Finite-Time ControlB.1 Optimal Linear-Quadratic of Basics problemsB constrained for conditions Optimality problemsA.2 unconstrained for conditions Optimality OptimizationA.1 of Basics AppendixA V ConclusionsPart System12.3 Compromised Partially a of Availability Mechanism12.2.2 Safe-Mode CPSs12.2.1 in Issues Data-Availability Directions: Research Attack12.2 Compromised-Key Attack12.1.2 Man-in-the-Middle Models12.1.1 Attack Advanced Directions: Research CPSs12.1 of Design Security in Work Future Work12 Future the of Discussion IV NotesPart and Conclusions Performance11.5 Cyber II: Part Performance11.4.2 Physical I: Part Results11.4.1 Experimental POMDP11.4 Cyber the of Case Special POMDP11.3.3 Cyber of Results Main POMDP11.3.2 Cyber the of Setups Basic ROSs11.3.1 for Formulation POMDP Cyber Process11.3 Decision Markov Cyber Stochastic Actions11.2.7 Cyber and States Cyber Length11.2.6 Key the of Design Physical-Aware Delay11.2.5 Estimated the and MAC Lightweight The Attack11.2.4 Data-Integrity Model: Attack agent11.2.3 ROS a of Dynamics Physical The 11.2.2 Mechanism Proposed the of Outline The Formulation11.2.1 Problem ROSs11.2 Networked in Challenges New ROSs11.1 of Control Resilient and Secure Notes11 and Conclusions Partition10.3 Markov on based Algorithms POMDPs10.2.2 of Property Linear Piecewise POMDPs10.2.1 Horizon Infinite for Algorithms Programming10.2 Dynamic Stochastic POMDP10.1.3 a of Formulation State Belief POMDP10.1.2 a of Definition POMDPs10.1.1 of Preliminaries MDPs10.1 Observed Partially to Introduction Notes10 and Conclusions Setup9.5 Experimental Results9.4.1 Simulation Attack9.4 Stealthy the Under Loss Estimated SGE9.3.3 the of PBNE a and Players the of Response Best CPSs9.3.2 the for Setup SGE SGE9.3.1 Cyber the of Results Equilibrium Evidence9.3 with Game Signaling of Setup General CPS9.2.5 the for Twin Digital Attack9.2.4 Estimation Stealthy Problem9.2.3 Filter Kalman CPS9.2.2 a of Problem Control and Model System Characterization9.2.1 and Modelling System CPS9.2 in Level Security Enhance to Twin Digital Using Twin9.1 Digital a with CPS of Estimation Secure Notes9 and Conclusions Layer8.6 Physical of Results The Layer8.5.2 Cyber of Results The Results8.5.1 Experimental Layers8.5 Cyber and Physical Between Inter-dependency Game8.4.4 Two-Channel Study: Case Special Game8.4.3 the of Equilibrium the Analyzing Game8.4.2 Zero-Sum Cyber Framework8.4.1 Game-Theoretic Stochastic The System8.4 CBTC for Criterion Security Problem8.3.2 Estimation Physical Criterion8.3.1 Security and Approach Estimation Model8.3 Attack and Model Communication System8.2.2 Train a of Model Physical The Formulation8.2.1 Problem systems8.2 CBTC to Introduction Systems8.1 CBTC of Control Secure to Framework Game A Notes8 and Conclusion Results7.5 Numerical Equilibrium7.4 Game Stackelberg Cyber-Physical the of Analysis Equilibrium7.3.3 Game FlipIt Cyber the of Analysis Equilibrium7.3.2 Game Zero-Sum Physical the of Analysis Games7.3.1 Cyber-Physical the of Analysis Model7.3 Game Stackelberg Cyber-physical A Model7.2.5 Game FlipIt Cyber The Systems7.2.4 3D-printing for Model Attack Cyber-Physical A Framework7.2.3 Game Zero-Sum Physical Systems7.2.2 Printing 3D of Model Dynamic The Formulation7.2.1 Problem Printers7.2 3D Networked in Challenges New Printers7.1 3D of Control Secure to Approach Game-Theoretic A Notes707 and Conclusion Evidence6.6 with Game Signaling 6.5 Game FlipIt the of Analysis Game6.4.2 FlipIt of Formulation Model6.4.1 Game FlipIt Game6.4 Stackelberg on based Design Security Game6.3.2 Stackelberg the of Formulation Model6.3.1 Game Stackelberg Game6.3 Zero-sum the of Formulation Model6.2.1 Game Zero-Sum Two-Person Theory6.2 Game to Introduction Theory6.1 Game of Review CPS6 for Approach Game-Theoretic III NotesPart and Conclusions Errors5.7 Quantization the of Impact The Information5.6.2 Encrypted the of Output The Results5.6.1 Experimental Errors5.6 Quantization of Analysis Analysis5.5 Security Analysis5.4.2 E_ciency Security5.4.1 and E_ciency the of Analysis Computation5.4 Outsourcing for Encryption Customized Observer5.3.3 Homomorphic The Encryption5.3.2 Homomorphic Additive The Assimilation5.3.1 Data Outsourcing Secure The Objectives5.3 Design and Challenges Filter5.2.2 Kalman Outsourcing the and Model System Formulation5.2.1 Problem CE-LSNs5.2 to Introduction Networks5.1 Sensor Cloud of Assimilation Data Secure Notes5 and Conclusions Experiments4.8 and Analysis 4.7 Mode4 Safe the for Controller Local The Condition4.6.3 Switching and Mode Bu_er Mechanism4.6.2 Mode Switching Issues4.6.1 Availability Methods4.6 Verification Methods4.5.2 Encryption Integrity4.5.1 and Confidentiality mechanism4.5 proposed the of Framework The Models4.4.2 Attack Cloud Problem4.4.1 Quadratic of form Standard The Algorithm4.4 MPC and Dynamics System Statements4.3 Problem CE-CPS4.2 of Solutions Proposed and Challenges New CPS4.1 Could-Enabled of Design Resilient and Secure Conclusion4 CE-CPSs3.3 of Requirements Security New Manufacturing3.2 Cloud-Enabled Systems3.1.4 Transport Cloud-Enabled Grids3.1.3 Smart Cloud-Enabled Robotics3.1.2 Cloud-Enabled CE-CPSs3.1.1 of Applications Promising CPS3.1 Cloud-Enabled Architecture: New CPS3 of Computations Outsourcing Secure II ConclusionsPart Information2.5 Incomplete under Design Cross-Layer Theory2.4 Control with Theory Game Connecting Design: Cross-Layer Theory2.3 Control and Cryptography Connecting Design: Cross-Layer Design2.2 Cross-Layer to Introduction CPSs2.1 for Framework Cross-Layer book2 the of Outline Works1.4 Related and Overview CPS1.3 in Challenges New Cities1.2 Smart and Systems Cyber-Physical Introduction1.1 Framework1 and Motivation I Part Einige Waren lassen sich natürlich auch online versenden wie eBooks Search Engine Marketing Kreditkarte Konsumenten soll das Ranking bei Suchmaschinen wie Google, Bing, Yahoo und anderen verbessern

Verwirrt? Link zum original Text


EAN: 9783030602505
Marke: Springer Berlin,Springer
weitere Infos: MPN: 87232634
  im Moment nicht an Lager
Online Shop: eUniverse

CHF 157.00 bei eUniverse

Kostenloser Versand

Verfügbarkeit: 21 Werktage Tage