Cybersecurity of Discrete Event Systems

Cybersecurity of Discrete Event Systems
Author :
Publisher : CRC Press
Total Pages : 283
Release :
ISBN-10 : 9781040031322
ISBN-13 : 1040031323
Rating : 4/5 (22 Downloads)

Book Synopsis Cybersecurity of Discrete Event Systems by : Rong Su

Download or read book Cybersecurity of Discrete Event Systems written by Rong Su and published by CRC Press. This book was released on 2024-09-05 with total page 283 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.


Cybersecurity of Discrete Event Systems Related Books

Cybersecurity of Discrete Event Systems
Language: en
Pages: 283
Authors: Rong Su
Categories: Computers
Type: BOOK - Published: 2024-09-05 - Publisher: CRC Press

DOWNLOAD EBOOK

This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough
Cyber Security for Discrete Event Systems
Language: en
Pages: 200
Authors: Raphael Fritz
Categories: Technology & Engineering
Type: BOOK - Published: 2024-03-25 - Publisher: Logos Verlag Berlin GmbH

DOWNLOAD EBOOK

Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastruc
H-Systems
Language: en
Pages: 305
Authors: Elena De Santis
Categories: Technology & Engineering
Type: BOOK - Published: 2023-05-08 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book focuses on the observability of hybrid systems. It enables the reader to determine whether and how a hybrid system’s state can be reconstructed from
Cyber-Physical Systems
Language: en
Pages: 623
Authors: Gaddadevara Matt Siddesh
Categories: Computers
Type: BOOK - Published: 2015-12-01 - Publisher: CRC Press

DOWNLOAD EBOOK

In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous fe
Cybersecurity
Language: en
Pages: 294
Authors: Tugrul U Daim
Categories: Business & Economics
Type: BOOK - Published: 2023-08-23 - Publisher: Springer Nature

DOWNLOAD EBOOK

Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of