Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber-physical systems security
~
Koc, Cetin Kaya.
Cyber-physical systems security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyber-physical systems securityedited by Cetin Kaya Koc.
other author:
Koc, Cetin Kaya.
Published:
Cham :Springer International Publishing :2018.
Description:
xi, 344 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Cooperating objects (Computer systems)Security measures.
Online resource:
https://doi.org/10.1007/978-3-319-98935-8
ISBN:
9783319989358$q(electronic bk.)
Cyber-physical systems security
Cyber-physical systems security
[electronic resource] /edited by Cetin Kaya Koc. - Cham :Springer International Publishing :2018. - xi, 344 p. :ill., digital ;24 cm.
Robust Digital Computation in the Physical World -- Constraint-Based Framework for Reasoning with Differential Equations -- Approximate Computing and Its Application to Hardware Security -- Mathematical Optimizations for Deep Learning -- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems -- Parallel Programming in Cyber-Physical Systems -- Automatic Application of Software Countermeasures Against Physical Attacks -- Time-Delay Attacks in Network Systems -- Attack Tree Construction and Its Application to the Connected Vehicle -- Reinforcement Learning and Trustworthy Autonomy -- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks -- Public-Key-Based Lightweight Swarm Authentication -- Physical Security Versus Masking Schemes -- Embedded Classifiers for Energy Constrained IoT Network Security -- Challenges in Cyber Security: Ransomware Phenomenon -- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
ISBN: 9783319989358$q(electronic bk.)
Standard No.: 10.1007/978-3-319-98935-8doiSubjects--Topical Terms:
750561
Cooperating objects (Computer systems)
--Security measures.
LC Class. No.: TK7895.E42
Dewey Class. No.: 006.22
Cyber-physical systems security
LDR
:02456nmm a2200337 a 4500
001
546706
003
DE-He213
005
20181206210103.0
006
m d
007
cr nn 008maaau
008
190627s2018 gw s 0 eng d
020
$a
9783319989358$q(electronic bk.)
020
$a
9783319989341$q(paper)
024
7
$a
10.1007/978-3-319-98935-8
$2
doi
035
$a
978-3-319-98935-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7895.E42
072
7
$a
UMB
$2
bicssc
072
7
$a
COM031000
$2
bisacsh
072
7
$a
UMB
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
006.22
$2
23
090
$a
TK7895.E42
$b
C994 2018
245
0 0
$a
Cyber-physical systems security
$h
[electronic resource] /
$c
edited by Cetin Kaya Koc.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xi, 344 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Robust Digital Computation in the Physical World -- Constraint-Based Framework for Reasoning with Differential Equations -- Approximate Computing and Its Application to Hardware Security -- Mathematical Optimizations for Deep Learning -- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems -- Parallel Programming in Cyber-Physical Systems -- Automatic Application of Software Countermeasures Against Physical Attacks -- Time-Delay Attacks in Network Systems -- Attack Tree Construction and Its Application to the Connected Vehicle -- Reinforcement Learning and Trustworthy Autonomy -- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks -- Public-Key-Based Lightweight Swarm Authentication -- Physical Security Versus Masking Schemes -- Embedded Classifiers for Energy Constrained IoT Network Security -- Challenges in Cyber Security: Ransomware Phenomenon -- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.
520
$a
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
650
0
$a
Cooperating objects (Computer systems)
$x
Security measures.
$3
750561
650
1 4
$a
Data Structures and Information Theory.
$3
825714
650
2 4
$a
Security.
$3
760527
650
2 4
$a
Crime Control and Security.
$3
790897
650
2 4
$a
Security Science and Technology.
$3
510148
700
1
$a
Koc, Cetin Kaya.
$3
338656
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-319-98935-8
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000163073
電子館藏
1圖書
電子書
EB TK7895.E42 C994 2018 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-319-98935-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login