Pang / Liu / Zhou | Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks | E-Book | sack.de
E-Book

E-Book, Englisch, 219 Seiten, eBook

Pang / Liu / Zhou Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks


1. Auflage 2018
ISBN: 978-981-13-0520-7
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 219 Seiten, eBook

ISBN: 978-981-13-0520-7
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.
Pang / Liu / Zhou Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Introduction.-  Part I: Networked Predictive Control of Systems with Communication Constraints.- Preliminaries for NCSs.- Networked Predictive Control Based on Linear Input-Output Models.- Incremental Networked Predictive Control Based on Linear Input-Output Models.- Networked Predictive Control Based on Nonlinear Input-Output Models.- Networked Predictive Control Based on State-Space Models.- Networked Predictive Output Tracking Control Based on State-Space Models.-  Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints.- Preliminaries for Cyber Attacks.- Data Secure Transmission Scheme for Deception Attacks.- Secure Networked Predictive Control under Deception Attacks and Communication Constraints.- False Data Injection Attacks against Output Tracking Control Systems.- False Data Injection Attacks against Networked Predictive Output Tracking Control Systems.- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.