
Secure Detection and Control in Cyber-Physical Systems
Working in the Presence of Malicious Data
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Secure Detection and Control in Cyber-Physical Systems
Working in the Presence of Malicious Data
About this book
In this pioneering reference work, Drs. Yan, Mo, and Wen explain secure detection and control algorithms for cyber-physical systems; describe their history and development, recent advances, and future trends; and provide practical examples to illustrate the topic.
Secure Detection and Control in Cyber-Physical Systems: Working in the Presence of Malicious Data presents readers with the basic concepts of cyber-physical systems, secure detection, and control theory, and explanations of new designs for secure detection and control algorithms that can provide acceptable system performance in the presence of attacks. The authors combine recent research results with a comprehensive comparison of such algorithms and provide ideas for future research. They also provide a concise overview of the state-of-the-art cyber-physical system security in a systems and control framework. Content is presented throughout in plain text with equations. Tables and charts are also included to complement the descriptions of the algorithms and aid reader's understanding. Throughout, the authors also present practical examples to illustrate the main ideas. Through this book, readers will gain a comprehensive understanding of the field, including its history, recent advances, and future trends. Readers will be able to apply the relevant algorithms to cyber-physical systems in various contexts – such as aerospace, transportation, power grids, and robotics – and enhance their resiliency to attacks.
This book is vital for researchers and engineers who are researching and working in the fields of cyber-physical systems, secure detection, control theory, and related topics. It is also hugely beneficial for students in the fields of information technology, control systems, or power systems. Readers should have a basic understanding of linear algebra, convex optimization, and stochastic processes.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half-Title Page
- Title Page
- Copyright Page
- Dedication Page
- Contents
- Preface
- Authors
- 1 Introduction
- 2 Literature Review
- 3 Sequential Detection with Byzantine Sensors
- 4 Resilient Consensus of Second-Order Systems through Impulsive Control
- 5 Resilient Multi-Dimensional Consensus in Adversarial Environment
- 6 Resilient Containment Control in Adversarial Environment
- 7 Conclusions and Future Work
- Bibliography