TY - GEN AB - This book analyzes the secure problems of cyber-physical systems from both the adversary and defender sides. Targeting the challenging security problems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers will find not only the valuable secure state estimation and control schemes combined with the approaches aforementioned, but also some vital conclusions for securing cyber-physical systems, for example, the critical value of allowed attack probability, the maximum number of sensors to be attacked, etc. The book also provides practical applications, example of which are unmanned aerial vehicles, interruptible power system, and robot arm to validate the proposed secure algorithms. Given its scope, it offers a valuable resource for undergraduate and graduate students, academics, scientists, and engineers who are working in this field. AU - Wu, Chengwei, AU - Yao, Weiran, AU - Sun, Guanghui, AU - Wu, Ligang, CN - QA76.9.A25 CY - Cham, Switzerland : DA - [2022] DO - 10.1007/978-3-030-88350-8 DO - doi ID - 1442466 KW - Cooperating objects (Computer systems) KW - Objets coopérants (Systèmes informatiques) LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-88350-8 N2 - This book analyzes the secure problems of cyber-physical systems from both the adversary and defender sides. Targeting the challenging security problems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers will find not only the valuable secure state estimation and control schemes combined with the approaches aforementioned, but also some vital conclusions for securing cyber-physical systems, for example, the critical value of allowed attack probability, the maximum number of sensors to be attacked, etc. The book also provides practical applications, example of which are unmanned aerial vehicles, interruptible power system, and robot arm to validate the proposed secure algorithms. Given its scope, it offers a valuable resource for undergraduate and graduate students, academics, scientists, and engineers who are working in this field. PB - Springer, PP - Cham, Switzerland : PY - [2022] SN - 9783030883508 SN - 3030883507 T1 - Security of cyber-physical systems :state estimation and control / TI - Security of cyber-physical systems :state estimation and control / UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-88350-8 VL - v. 396 ER -