Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Pang, Zhong-Hua (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Liu, Guo-Ping (http://id.loc.gov/vocabulary/relators/aut), Zhou, Donghua (http://id.loc.gov/vocabulary/relators/aut), Sun, Dehui (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04278nam a2200541 4500
001 978-981-13-0520-7
003 DE-He213
005 20191022071724.0
007 cr nn 008mamaa
008 180612s2019 si | s |||| 0|eng d
020 |a 9789811305207  |9 978-981-13-0520-7 
024 7 |a 10.1007/978-981-13-0520-7  |2 doi 
040 |d GrThAP 
050 4 |a TJ212-225 
072 7 |a TJFM  |2 bicssc 
072 7 |a TEC004000  |2 bisacsh 
072 7 |a TJFM  |2 thema 
082 0 4 |a 629.8  |2 23 
100 1 |a Pang, Zhong-Hua.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks  |h [electronic resource] /  |c by Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun. 
250 |a 1st ed. 2019. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2019. 
300 |a XX, 219 p. 123 illus., 105 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Part I: Networked Predictive Control of Systems with Communication Constraints -- Preliminaries for NCSs -- Networked Predictive Control Based on Linear Input-Output Models -- Incremental Networked Predictive Control Based on Linear Input-Output Models -- Networked Predictive Control Based on Nonlinear Input-Output Models -- Networked Predictive Control Based on State-Space Models -- Networked Predictive Output Tracking Control Based on State-Space Models -- Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints -- Preliminaries for Cyber Attacks -- Data Secure Transmission Scheme for Deception Attacks -- Secure Networked Predictive Control under Deception Attacks and Communication Constraints -- False Data Injection Attacks against Output Tracking Control Systems -- False Data Injection Attacks against Networked Predictive Output Tracking Control System s -- Secure Networked Predictive Control under DoS Attacks and Communication Constraints. 
520 |a This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. . 
650 0 |a Control engineering. 
650 0 |a Computer organization. 
650 0 |a Electrical engineering. 
650 0 |a Data protection. 
650 1 4 |a Control and Systems Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/T19010 
650 2 4 |a Computer Systems Organization and Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13006 
650 2 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
650 2 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
700 1 |a Liu, Guo-Ping.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Zhou, Donghua.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Sun, Dehui.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811305191 
776 0 8 |i Printed edition:  |z 9789811305214 
776 0 8 |i Printed edition:  |z 9789811344398 
856 4 0 |u https://doi.org/10.1007/978-981-13-0520-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-INR 
950 |a Intelligent Technologies and Robotics (Springer-42732)