Cyber-Physical Systems Security (eBook, PDF)
149,79 €
inkl. MwSt.
Sofort per Download lieferbar
Cyber-Physical Systems Security (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 15.47MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Eddy WillemsCyberdanger (eBook, PDF)24,60 €
- Security and Privacy Trends in the Industrial Internet of Things (eBook, PDF)96,29 €
- Cybersecurity and Secure Information Systems (eBook, PDF)96,29 €
- Deep Learning Applications for Cyber Security (eBook, PDF)149,79 €
- Quantum Random Number Generation (eBook, PDF)139,09 €
- Resilience of Cyber-Physical Systems (eBook, PDF)139,09 €
- Critical Infrastructure Security and Resilience (eBook, PDF)149,79 €
-
-
-
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Erscheinungstermin: 6. Dezember 2018
- Englisch
- ISBN-13: 9783319989358
- Artikelnr.: 54735353
- Verlag: Springer International Publishing
- Erscheinungstermin: 6. Dezember 2018
- Englisch
- ISBN-13: 9783319989358
- Artikelnr.: 54735353
Robust Digital Computation in the Physical World.- Constraint-Based Framework for Reasoning with Differential Equations.- Approximate Computing and Its Application to Hardware Security.- Mathematical Optimizations for Deep Learning.- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems.- Parallel Programming in Cyber-Physical Systems.- Automatic Application of Software Countermeasures Against Physical Attacks.- Time-Delay Attacks in Network Systems.- Attack Tree Construction and Its Application to the Connected Vehicle.- Reinforcement Learning and Trustworthy Autonomy.- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks.- Public-Key-Based Lightweight Swarm Authentication.- Physical Security Versus Masking Schemes.- Embedded Classifiers for Energy Constrained IoT Network Security.- Challenges in Cyber Security: Ransomware Phenomenon.- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.
Robust Digital Computation in the Physical World.- Constraint-Based Framework for Reasoning with Differential Equations.- Approximate Computing and Its Application to Hardware Security.- Mathematical Optimizations for Deep Learning.- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems.- Parallel Programming in Cyber-Physical Systems.- Automatic Application of Software Countermeasures Against Physical Attacks.- Time-Delay Attacks in Network Systems.- Attack Tree Construction and Its Application to the Connected Vehicle.- Reinforcement Learning and Trustworthy Autonomy.- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks.- Public-Key-Based Lightweight Swarm Authentication.- Physical Security Versus Masking Schemes.- Embedded Classifiers for Energy Constrained IoT Network Security.- Challenges in Cyber Security: Ransomware Phenomenon.- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.
Robust Digital Computation in the Physical World.- Constraint-Based Framework for Reasoning with Differential Equations.- Approximate Computing and Its Application to Hardware Security.- Mathematical Optimizations for Deep Learning.- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems.- Parallel Programming in Cyber-Physical Systems.- Automatic Application of Software Countermeasures Against Physical Attacks.- Time-Delay Attacks in Network Systems.- Attack Tree Construction and Its Application to the Connected Vehicle.- Reinforcement Learning and Trustworthy Autonomy.- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks.- Public-Key-Based Lightweight Swarm Authentication.- Physical Security Versus Masking Schemes.- Embedded Classifiers for Energy Constrained IoT Network Security.- Challenges in Cyber Security: Ransomware Phenomenon.- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.
Robust Digital Computation in the Physical World.- Constraint-Based Framework for Reasoning with Differential Equations.- Approximate Computing and Its Application to Hardware Security.- Mathematical Optimizations for Deep Learning.- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems.- Parallel Programming in Cyber-Physical Systems.- Automatic Application of Software Countermeasures Against Physical Attacks.- Time-Delay Attacks in Network Systems.- Attack Tree Construction and Its Application to the Connected Vehicle.- Reinforcement Learning and Trustworthy Autonomy.- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks.- Public-Key-Based Lightweight Swarm Authentication.- Physical Security Versus Masking Schemes.- Embedded Classifiers for Energy Constrained IoT Network Security.- Challenges in Cyber Security: Ransomware Phenomenon.- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.