Control and Game Theoretic Methods for Cyber-Physical Security: Emerging Methodologies and Applications in Modelling, Identification and Control
Autor Aris Kanellopoulos, Lijing Zhai, Filippos Fotiadis, Kyriakos Vamvoudakisen Limba Engleză Paperback – 30 mai 2024
- Serves as a bibliography on different aspects of security in cyber-physical systems
- Offers insights into security through innovative approaches, which amalgamate principles from diverse disciplines
- Explores unresolved challenges in the security domain, examining them through the lens of rigorous formulations from control and game theory
Din seria Emerging Methodologies and Applications in Modelling, Identification and Control
- Preț: 499.28 lei
- 39% Preț: 715.68 lei
- 28% Preț: 723.46 lei
- 31% Preț: 642.78 lei
- 29% Preț: 669.29 lei
- 22% Preț: 547.19 lei
- 37% Preț: 691.26 lei
- 27% Preț: 685.31 lei
- 22% Preț: 816.54 lei
- 27% Preț: 817.83 lei
- 37% Preț: 818.96 lei
- 28% Preț: 995.96 lei
- 22% Preț: 688.84 lei
- 20% Preț: 855.82 lei
- 20% Preț: 853.89 lei
- 20% Preț: 854.39 lei
- 24% Preț: 714.19 lei
- 23% Preț: 678.54 lei
- 24% Preț: 628.65 lei
- 24% Preț: 625.89 lei
- 32% Preț: 941.05 lei
- 9% Preț: 943.92 lei
- 24% Preț: 733.52 lei
- 9% Preț: 686.35 lei
- 24% Preț: 582.26 lei
- 27% Preț: 896.12 lei
- 24% Preț: 712.55 lei
- 24% Preț: 669.92 lei
- 24% Preț: 753.00 lei
- 9% Preț: 943.89 lei
Preț: 666.61 lei
Preț vechi: 732.54 lei
-9% Nou
Puncte Express: 1000
Preț estimativ în valută:
127.57€ • 133.02$ • 106.02£
127.57€ • 133.02$ • 106.02£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780443154089
ISBN-10: 0443154082
Pagini: 198
Dimensiuni: 152 x 229 mm
Editura: ELSEVIER SCIENCE
Seria Emerging Methodologies and Applications in Modelling, Identification and Control
ISBN-10: 0443154082
Pagini: 198
Dimensiuni: 152 x 229 mm
Editura: ELSEVIER SCIENCE
Seria Emerging Methodologies and Applications in Modelling, Identification and Control
Cuprins
1. Introduction
2. Control-theoretic intrusion detection
3. Redundancy-based defense
4. Timing Faults and Attacks
5. Adversarial Modelling
6. Future Research Directions
2. Control-theoretic intrusion detection
3. Redundancy-based defense
4. Timing Faults and Attacks
5. Adversarial Modelling
6. Future Research Directions