Cross-Layer Design for Secure and Resilient Cyber-Physical Systems Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
Advances in Information Security

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems

A Decision and Game Theoretic Approach

    • ‏149٫99 US$
    • ‏149٫99 US$

وصف الناشر

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies.

With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network.

This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies.  These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges.

A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢٠
١٦ نوفمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٢٢٩
الناشر
Springer International Publishing
البائع
Springer Nature B.V.
الحجم
٢٤٫٨
‫م.ب.‬
Decision and Game Theory for Security Decision and Game Theory for Security
٢٠٢٠
Decision and Game Theory for Security Decision and Game Theory for Security
٢٠٢١
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
٢٠٢١
Information and Communications Security Information and Communications Security
٢٠٢١
Security and Privacy Security and Privacy
٢٠٢١
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
٢٠٢٢
Cyber-Security in Critical Infrastructures Cyber-Security in Critical Infrastructures
٢٠٢٠
Cybersicherheit in kritischen Infrastrukturen Cybersicherheit in kritischen Infrastrukturen
٢٠٢٥
Decision and Game Theory for Security Decision and Game Theory for Security
٢٠٢٤
Cognitive Security Cognitive Security
٢٠٢٣
Cyber-Security Threats and Response Models in Nuclear Power Plants Cyber-Security Threats and Response Models in Nuclear Power Plants
٢٠٢٢
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
٢٠٢٢
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures Network Security Policies and Procedures
٢٠٠٧