Cybersecurity of Discrete Event Systems From Smart Attacks to Resilient Defence

booksz

U P L O A D E R
a9e026c22003a021c470d353553b3285.webp

Free Download Cybersecurity of Discrete Event Systems; From Smart Attacks to Resilient Defence
by Rong Su

English | 2024 | ISBN: 1032368101 | 283 pages | True PDF | 26.18 MB

This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first book in the DES community to provide a thorough introduction to smart cyberattacks on supervisory control systems modeled by regular languages or finite-state automata.
"Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor's input of the supervisor) or in the command channel (i.e., the supervisor's output) or both simultaneously. Therefore, defense strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises three sections. First, Su introduces the required concepts and techniques related to DES and supervisory control. Second, he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Third, he presents resilient defense strategies against relevant types of attacks.
By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Links are Interchangeable - Single Extraction
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.in | Dataload.in

Auf Data-Load.in findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load.in / Dataload.in legal?

Data-Load.in ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load.in gespeichert.
Oben Unten