Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : ISD LLC, Bristol, CT, Etats-Unis
paperback. Etat : New. N° de réf. du vendeur 1829411
Quantité disponible : 4 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 48264641-n
Quantité disponible : 4 disponible(s)
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Paperback. Etat : new. Paperback. Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9783832557997
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 48264641
Quantité disponible : 4 disponible(s)
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
Etat : New. 2024. paperback. . . . . . N° de réf. du vendeur V9783832557997
Quantité disponible : 2 disponible(s)
Vendeur : Kennys Bookstore, Olney, MD, Etats-Unis
Etat : New. 2024. paperback. . . . . . Books ship from the US and Ireland. N° de réf. du vendeur V9783832557997
Quantité disponible : 2 disponible(s)
Vendeur : AussieBookSeller, Truganina, VIC, Australie
Paperback. Etat : new. Paperback. Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. N° de réf. du vendeur 9783832557997
Quantité disponible : 1 disponible(s)