<p><p>This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students i
Cyber-Physical Systems Security
โ Scribed by รetin Kaya Koรง
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 347
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
โฆ Table of Contents
Front Matter ....Pages i-xi
Robust Digital Computation in the Physical World (Jackson R. Mayo, Robert C. Armstrong, Geoffrey C. Hulette, Maher Salloum, Andrew M. Smith)....Pages 1-21
Constraint-Based Framework for Reasoning with Differential Equations (Julien Alexandre dit Sandretto, Alexandre Chapoutot, Olivier Mullier)....Pages 23-41
Approximate Computing and Its Application to Hardware Security (Weiqiang Liu, Chongyan Gu, Gang Qu, Mรกire OโNeill)....Pages 43-67
Mathematical Optimizations for Deep Learning (Sam Green, Craig M. Vineyard, รetin Kaya Koรง)....Pages 69-92
A Zero-Entry Cyber Range Environment for Future Learning Ecosystems (Elaine M. Raybourn, Michael Kunz, David Fritz, Vince Urias)....Pages 93-109
Parallel Programming in Cyber-Physical Systems (Sandro Bartolini, Biagio Peccerillo)....Pages 111-134
Automatic Application of Software Countermeasures Against Physical Attacks (Nicolas Belleville, Karine Heydemann, Damien Couroussรฉ, Thierno Barry, Bruno Robisson, Abderrahmane Seriai et al.)....Pages 135-155
Time-Delay Attacks in Network Systems (Gianluca Bianchin, Fabio Pasqualetti)....Pages 157-174
Attack Tree Construction and Its Application to the Connected Vehicle (Khaled Karray, Jean-Luc Danger, Sylvain Guilley, M. Abdelaziz Elaabid)....Pages 175-190
Reinforcement Learning and Trustworthy Autonomy (Jieliang Luo, Sam Green, Peter Feghali, George Legrady, รetin Kaya Koรง)....Pages 191-217
Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks (Khaled Karray, Jean-Luc Danger, Sylvain Guilley, M. Abdelaziz Elaabid)....Pages 219-254
Public Key-Based Lightweight Swarm Authentication (Simon Cogliani, Bao Feng, Houda Ferradi, Rรฉmi Gรฉraud, Diana Maimuลฃ, David Naccache et al.)....Pages 255-267
Physical Security Versus Masking Schemes (Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Tang Ming)....Pages 269-284
Embedded Classifiers for Energy-Constrained IoT Network Security (Jennifer Hasler)....Pages 285-301
Challenges in Cyber Security: Ransomware Phenomenon (Vlad-Raul Paลca, Emil Simion)....Pages 303-330
Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems (Elaine M. Raybourn, Ray Trechter)....Pages 331-344
โฆ Subjects
Computer Science; Data Structures, Cryptology and Information Theory; Security; Crime Control and Security; Security Science and Technology
๐ SIMILAR VOLUMES
<p><span>In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0
<p><span>In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0
<p><span>Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems. The integration of AI/ML into the realm of IoT and CPS security has gained significant attention and momentum in rece
<p><span>This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and