|
|
|
|
LEADER |
02848nam a22004695i 4500 |
001 |
978-3-319-51328-7 |
003 |
DE-He213 |
005 |
20171108141918.0 |
007 |
cr nn 008mamaa |
008 |
170103s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319513287
|9 978-3-319-51328-7
|
024 |
7 |
|
|a 10.1007/978-3-319-51328-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK7888.4
|
072 |
|
7 |
|a TJFC
|2 bicssc
|
072 |
|
7 |
|a TEC008010
|2 bisacsh
|
082 |
0 |
4 |
|a 621.3815
|2 23
|
100 |
1 |
|
|a Lin, Chung-Wei.
|e author.
|
245 |
1 |
0 |
|a Security-Aware Design for Cyber-Physical Systems
|h [electronic resource] :
|b A Platform-Based Approach /
|c by Chung-Wei Lin, Alberto Sangiovanni-Vincentelli.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a VII, 102 p. 31 illus., 2 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Security Threats in Cyber-Physical Systems -- Security Mechanisms for CAN Protocol -- Security-Aware Mapping for CAN-Based Systems -- Security-Aware Mapping for TDMA-Based Systems -- Security-Aware Design for V2V Communication -- FSM-Based Security-Aware Design -- Graph-Based Security-Aware Design -- Conclusions.
|
520 |
|
|
|a Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. .
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Circuits and Systems.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Sangiovanni-Vincentelli, Alberto.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319513270
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-51328-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|