Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach
Autor Chung-Wei Lin, Alberto Sangiovanni-Vincentellien Limba Engleză Hardback – 9 ian 2017
Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 703.50 lei 43-57 zile | |
Springer International Publishing – 30 apr 2018 | 703.50 lei 43-57 zile | |
Hardback (1) | 709.22 lei 43-57 zile | |
Springer International Publishing – 9 ian 2017 | 709.22 lei 43-57 zile |
Preț: 709.22 lei
Preț vechi: 864.91 lei
-18% Nou
Puncte Express: 1064
Preț estimativ în valută:
135.73€ • 140.99$ • 112.74£
135.73€ • 140.99$ • 112.74£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319513270
ISBN-10: 3319513273
Pagini: 115
Ilustrații: VII, 102 p. 31 illus., 2 illus. in color.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.34 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319513273
Pagini: 115
Ilustrații: VII, 102 p. 31 illus., 2 illus. in color.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.34 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Introduction.- Security Threats in Cyber-Physical Systems.- Security Mechanisms for CAN Protocol.- Security-Aware Mapping for CAN-Based Systems.- Security-Aware Mapping for TDMA-Based Systems.- Security-Aware Design for V2V Communication.- FSM-Based Security-Aware Design.- Graph-Based Security-Aware Design.- Conclusions.
Recenzii
“The authors have produced an interesting book, supplemented by a very rich bibliographic section, which serves as a source for reference and increased awareness to the practitioner community.” (Computing Reviews, October, 2017)
Caracteristici
Recommends appropriate security mechanisms for different cyber-physical systems Proposes systematic approaches to address security during the various design stages Describes the methods to satisfy system constraints and to optimize the overall cyber-physical system Includes supplementary material: sn.pub/extras