Cross-Layer Design for Secure and Resilient Cyber-Physical Systems Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
Advances in Information Security

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems

A Decision and Game Theoretic Approach

    • US$149.99
    • US$149.99

출판사 설명

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies.

With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network.

This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies.  These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges.

A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.

장르
컴퓨터 및 인터넷
출시일
2020년
11월 16일
언어
EN
영어
길이
229
페이지
출판사
Springer International Publishing
판매자
Springer Nature B.V.
크기
24.8
MB
Decision and Game Theory for Security Decision and Game Theory for Security
2020년
Decision and Game Theory for Security Decision and Game Theory for Security
2021년
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
2021년
Information and Communications Security Information and Communications Security
2021년
Security and Privacy Security and Privacy
2021년
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2022년
Cyber-Security in Critical Infrastructures Cyber-Security in Critical Infrastructures
2020년
Cybersicherheit in kritischen Infrastrukturen Cybersicherheit in kritischen Infrastrukturen
2025년
Decision and Game Theory for Security Decision and Game Theory for Security
2024년
Cognitive Security Cognitive Security
2023년
Cyber-Security Threats and Response Models in Nuclear Power Plants Cyber-Security Threats and Response Models in Nuclear Power Plants
2022년
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년