語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Networked predictive control of syst...
~
Pang, Zhong-Hua.
FindBook
Google Book
Amazon
博客來
Networked predictive control of systems with communication constraints and cyber attacks
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Networked predictive control of systems with communication constraints and cyber attacks/ by Zhong-Hua Pang ... [et al.].
其他作者:
Pang, Zhong-Hua.
出版者:
Singapore :Springer Singapore : : 2019.,
面頁冊數:
xx, 219 p. :ill., digital ;24 cm.
內容註:
Introduction -- Part I: Networked Predictive Control of Systems with Communication Constraints -- Preliminaries for NCSs -- Networked Predictive Control Based on Linear Input-Output Models -- Incremental Networked Predictive Control Based on Linear Input-Output Models -- Networked Predictive Control Based on Nonlinear Input-Output Models -- Networked Predictive Control Based on State-Space Models -- Networked Predictive Output Tracking Control Based on State-Space Models -- Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints -- Preliminaries for Cyber Attacks -- Data Secure Transmission Scheme for Deception Attacks -- Secure Networked Predictive Control under Deception Attacks and Communication Constraints -- False Data Injection Attacks against Output Tracking Control Systems -- False Data Injection Attacks against Networked Predictive Output Tracking Control System s -- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.
Contained By:
Springer eBooks
標題:
Predictive control. -
電子資源:
http://dx.doi.org/10.1007/978-981-13-0520-7
ISBN:
9789811305207
Networked predictive control of systems with communication constraints and cyber attacks
Networked predictive control of systems with communication constraints and cyber attacks
[electronic resource] /by Zhong-Hua Pang ... [et al.]. - Singapore :Springer Singapore :2019. - xx, 219 p. :ill., digital ;24 cm.
Introduction -- Part I: Networked Predictive Control of Systems with Communication Constraints -- Preliminaries for NCSs -- Networked Predictive Control Based on Linear Input-Output Models -- Incremental Networked Predictive Control Based on Linear Input-Output Models -- Networked Predictive Control Based on Nonlinear Input-Output Models -- Networked Predictive Control Based on State-Space Models -- Networked Predictive Output Tracking Control Based on State-Space Models -- Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints -- Preliminaries for Cyber Attacks -- Data Secure Transmission Scheme for Deception Attacks -- Secure Networked Predictive Control under Deception Attacks and Communication Constraints -- False Data Injection Attacks against Output Tracking Control Systems -- False Data Injection Attacks against Networked Predictive Output Tracking Control System s -- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.
ISBN: 9789811305207
Standard No.: 10.1007/978-981-13-0520-7doiSubjects--Topical Terms:
667592
Predictive control.
LC Class. No.: TJ217.6
Dewey Class. No.: 629.89
Networked predictive control of systems with communication constraints and cyber attacks
LDR
:02847nmm a2200313 a 4500
001
2176310
003
DE-He213
005
20180612161652.0
006
m d
007
cr nn 008maaau
008
191121s2019 si s 0 eng d
020
$a
9789811305207
$q
(electronic bk.)
020
$a
9789811305191
$q
(paper)
024
7
$a
10.1007/978-981-13-0520-7
$2
doi
035
$a
978-981-13-0520-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TJ217.6
072
7
$a
TJFM
$2
bicssc
072
7
$a
TEC004000
$2
bisacsh
082
0 4
$a
629.89
$2
23
090
$a
TJ217.6
$b
.N476 2019
245
0 0
$a
Networked predictive control of systems with communication constraints and cyber attacks
$h
[electronic resource] /
$c
by Zhong-Hua Pang ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
xx, 219 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Part I: Networked Predictive Control of Systems with Communication Constraints -- Preliminaries for NCSs -- Networked Predictive Control Based on Linear Input-Output Models -- Incremental Networked Predictive Control Based on Linear Input-Output Models -- Networked Predictive Control Based on Nonlinear Input-Output Models -- Networked Predictive Control Based on State-Space Models -- Networked Predictive Output Tracking Control Based on State-Space Models -- Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints -- Preliminaries for Cyber Attacks -- Data Secure Transmission Scheme for Deception Attacks -- Secure Networked Predictive Control under Deception Attacks and Communication Constraints -- False Data Injection Attacks against Output Tracking Control Systems -- False Data Injection Attacks against Networked Predictive Output Tracking Control System s -- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.
520
$a
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.
650
0
$a
Predictive control.
$3
667592
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Control.
$3
1006321
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
891212
650
2 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Security.
$3
3134865
700
1
$a
Pang, Zhong-Hua.
$3
3378241
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-981-13-0520-7
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9366179
電子資源
11.線上閱覽_V
電子書
EB TJ217.6
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入