Distributed Security Monitoring and Resilient Cooperative Control
eBook - ePub

Distributed Security Monitoring and Resilient Cooperative Control

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Distributed Security Monitoring and Resilient Cooperative Control

About this book

This book systematically addresses the security and resilience of networked agent systems, from sensor networks to general multi-agent systems, against evolving cyber threats.

Distributed Security Monitoring and Resilient Cooperative Control explores techniques for distributed security monitoring to detect sparse attacks on sensors (location-fixed/varying and sparse-fixed/varying), Byzantine node/link attacks, and vulnerability-related attacks in heterogeneous sensor networks. It provides advanced solutions for finite/fixed-time monitoring convergence under nonlinear dynamics. Regarding resilient cooperative control of multi-agent systems, the book tackles the challenge of isolation against various attacks, such as false data injection and covert, non-collusive, and collusive attacks. Practical applications range from resilient smart grids and attack-resistant drones to self-healing infrastructures. Rigorous mathematical frameworks, including graph theory and matrix analysis, establish a principled link between theoretical guarantees and the security operations of real-world networked agent systems. These frameworks offer tools to fortify critical networks against unpredictable, unstructured attacks.

This book will appeal to scholars, engineers, and practitioners involved in systems engineering, control theory, cybersecurity, and artificial intelligence.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Distributed Security Monitoring and Resilient Cooperative Control by Guanghui Wen,Yuezu Lv,Dan Zhao,Xuqiang Lei in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Cyber Security. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover Page
  2. Half-Title Page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Preface
  7. Chapter 1 Introduction
  8. Chapter 2 Preliminaries
  9. Chapter 3 Distributed security monitoring of homogeneous sensor networks against sparse sensor attacks
  10. Chapter 4 Distributed security monitoring of heterogeneous sensor networks against sparse sensor attacks
  11. Chapter 5 Distributed security monitoring against sparse attacks: From asymptotic to finite- and fixed-time convergence
  12. Chapter 6 Distributed security monitoring of sensor networks against localized Byzantine attacks
  13. Chapter 7 Resilient consensus of integrator-type NASs with switching topologies
  14. Chapter 8 Distributed resilient cooperative control of high-order NASs based on attack isolation
  15. Chapter 9 Distributed resilient cooperative control of high-order NASs against collusive attacks
  16. Chapter 10 Generalized graph-dependent isolation of collusive attacks
  17. Chapter 11 Resilient consensus of NASs under link attacks
  18. Bibliography
  19. Index