語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Networked Predictive Control of Syst...
~
SpringerLink (Online service)
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks/ by Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun.
作者:
Pang, Zhong-Hua.
其他作者:
Liu, Guo-Ping.
面頁冊數:
XX, 219 p. 123 illus., 105 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Control engineering. -
電子資源:
https://doi.org/10.1007/978-981-13-0520-7
ISBN:
9789811305207
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
Pang, Zhong-Hua.
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
[electronic resource] /by Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun. - 1st ed. 2019. - XX, 219 p. 123 illus., 105 illus. in color.online resource.
Introduction -- Part I: Networked Predictive Control of Systems with Communication Constraints -- Preliminaries for NCSs -- Networked Predictive Control Based on Linear Input-Output Models -- Incremental Networked Predictive Control Based on Linear Input-Output Models -- Networked Predictive Control Based on Nonlinear Input-Output Models -- Networked Predictive Control Based on State-Space Models -- Networked Predictive Output Tracking Control Based on State-Space Models -- Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints -- Preliminaries for Cyber Attacks -- Data Secure Transmission Scheme for Deception Attacks -- Secure Networked Predictive Control under Deception Attacks and Communication Constraints -- False Data Injection Attacks against Output Tracking Control Systems -- False Data Injection Attacks against Networked Predictive Output Tracking Control System s -- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. .
ISBN: 9789811305207
Standard No.: 10.1007/978-981-13-0520-7doiSubjects--Topical Terms:
1249728
Control engineering.
LC Class. No.: TJ212-225
Dewey Class. No.: 629.8
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
LDR
:03327nam a22003975i 4500
001
1016356
003
DE-He213
005
20200704235637.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811305207
$9
978-981-13-0520-7
024
7
$a
10.1007/978-981-13-0520-7
$2
doi
035
$a
978-981-13-0520-7
050
4
$a
TJ212-225
072
7
$a
TJFM
$2
bicssc
072
7
$a
TEC004000
$2
bisacsh
072
7
$a
TJFM
$2
thema
082
0 4
$a
629.8
$2
23
100
1
$a
Pang, Zhong-Hua.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310747
245
1 0
$a
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
$h
[electronic resource] /
$c
by Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
XX, 219 p. 123 illus., 105 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Part I: Networked Predictive Control of Systems with Communication Constraints -- Preliminaries for NCSs -- Networked Predictive Control Based on Linear Input-Output Models -- Incremental Networked Predictive Control Based on Linear Input-Output Models -- Networked Predictive Control Based on Nonlinear Input-Output Models -- Networked Predictive Control Based on State-Space Models -- Networked Predictive Output Tracking Control Based on State-Space Models -- Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints -- Preliminaries for Cyber Attacks -- Data Secure Transmission Scheme for Deception Attacks -- Secure Networked Predictive Control under Deception Attacks and Communication Constraints -- False Data Injection Attacks against Output Tracking Control Systems -- False Data Injection Attacks against Networked Predictive Output Tracking Control System s -- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.
520
$a
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. .
650
0
$a
Control engineering.
$3
1249728
650
0
$a
Computer organization.
$3
596298
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Control and Systems Theory.
$3
1211358
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Security.
$3
1114130
700
1
$a
Liu, Guo-Ping.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
785330
700
1
$a
Zhou, Donghua.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310748
700
1
$a
Sun, Dehui.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310749
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811305191
776
0 8
$i
Printed edition:
$z
9789811305214
776
0 8
$i
Printed edition:
$z
9789811344398
856
4 0
$u
https://doi.org/10.1007/978-981-13-0520-7
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入