Attack-and-Defense Games for Control Systems

Attack-and-Defense Games for Control Systems
Author :
Publisher : CRC Press
Total Pages : 252
Release :
ISBN-10 : 9781040093894
ISBN-13 : 1040093892
Rating : 4/5 (94 Downloads)

Book Synopsis Attack-and-Defense Games for Control Systems by : Huanhuan Yuan

Download or read book Attack-and-Defense Games for Control Systems written by Huanhuan Yuan and published by CRC Press. This book was released on 2024-08-06 with total page 252 pages. Available in PDF, EPUB and Kindle. Book excerpt: This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks. Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems. This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.


Attack-and-Defense Games for Control Systems Related Books

Attack-and-Defense Games for Control Systems
Language: en
Pages: 252
Authors: Huanhuan Yuan
Categories: Computers
Type: BOOK - Published: 2024-08-06 - Publisher: CRC Press

DOWNLOAD EBOOK

This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender g
Analysis and Design of Networked Control Systems under Attacks
Language: en
Pages: 219
Authors: Yuan Yuan
Categories: Computers
Type: BOOK - Published: 2018-09-21 - Publisher: CRC Press

DOWNLOAD EBOOK

This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security contr
Dynamic Games for Network Security
Language: en
Pages: 82
Authors: Xiaofan He
Categories: Technology & Engineering
Type: BOOK - Published: 2018-02-28 - Publisher: Springer

DOWNLOAD EBOOK

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learni
Adaptive Autonomous Secure Cyber Systems
Language: en
Pages: 291
Authors: Sushil Jajodia
Categories: Computers
Type: BOOK - Published: 2020-02-04 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target d
Adversarial Machine Learning
Language: en
Pages: 316
Authors: Aneesh Sreevallabh Chivukula
Categories: Computers
Type: BOOK - Published: 2023-03-06 - Publisher: Springer Nature

DOWNLOAD EBOOK

A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous pert