001471854 000__ 06134cam\\22006257i\4500 001471854 001__ 1471854 001471854 003__ OCoLC 001471854 005__ 20230908003318.0 001471854 006__ m\\\\\o\\d\\\\\\\\ 001471854 007__ cr\un\nnnunnun 001471854 008__ 230719s2023\\\\sz\a\\\\ob\\\\000\0\eng\d 001471854 019__ $$a1390187227$$a1390562181 001471854 020__ $$a9783031309724$$q(electronic bk.) 001471854 020__ $$a3031309723$$q(electronic bk.) 001471854 020__ $$z9783031309717 001471854 020__ $$z3031309715 001471854 0247_ $$a10.1007/978-3-031-30972-4$$2doi 001471854 035__ $$aSP(OCoLC)1390729192 001471854 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dOCLCQ 001471854 049__ $$aISEA 001471854 050_4 $$aTK5105.59 001471854 08204 $$a005.8$$223/eng/20230719 001471854 1001_ $$aLi, Lili,$$eauthor. 001471854 24510 $$aOutput regulation and cybersecurity of networked switched systems /$$cLili Li, Jun Fu. 001471854 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001471854 300__ $$a1 online resource (x, 205 pages) :$$billustrations (some color). 001471854 336__ $$atext$$btxt$$2rdacontent 001471854 337__ $$acomputer$$bc$$2rdamedia 001471854 338__ $$aonline resource$$bcr$$2rdacarrier 001471854 4901_ $$aStudies in systems, decision and control,$$x2198-4190 ;$$vvolume 475 001471854 504__ $$aIncludes bibliographical references. 001471854 5050_ $$a1.Introduction -- 2.Event-Triggered Output Regulation for Networked Flight Control System Based on an Asynchronous Switched System Approach -- 3.Output Regulation for Networked Switched Systems with Alternate Event-Triggered Control under Transmission Delays and Packet Losses -- 4.Memory-Based Event-Triggered Output Regulation for Networked Switched Systems with Severely Unstable Dynamics -- 5.Almost output regulation for switched linear systems with bumpless transfer control under destabilizing behaviors -- 6.Mixed Event-triggered Output Regulation for Networked Switched Systems with Severely Unstable Dynamics under Long-duration DoS Attacks -- 7.Dissipative Event-triggered Output Regulation for Networked Switched Systems with Severely Unstable Dynamics Against Integrity Deception Attacks -- 8.Event-Triggered Multi-Source Bumpless Transfer Control for Networked Switched Systems with Almost Output Regulation Against Switching Deception Attacks -- 9.Conclusions. 001471854 506__ $$aAccess limited to authorized users. 001471854 520__ $$aNetworked switched system has emerged as an essential system model in the field of control due to its accurate reflection of the wide-area distribution and typical switching characteristics of increasingly sophisticated controlled objects in engineering practice. The openness of communication networks, the limitation of communication resources, and the complexity of switching behaviors make it a challenging task to ensure the steady-state and transient performance of the output regulation of networked switched systems. This book proposes several novel methodologies for output regulation of networked switched systems from the perspective of both steady-state and transient performance. The core features of our approaches are fourfold: i) Without imposing stability requirements on individual subsystems and all switching instants, a series of innovative dwell-time switching technologies are established to handle the issue of output regulation for networked switched systems with severely unstable dynamics under event-triggering strategies in the presence of cyber attacks. ii) Taking into account switching rules and cyber attack parameters within the event-triggered control framework, event detection conditions, modal matching conditions, and event waiting conditions are constructed, and a series of new event-triggering mechanisms are proposed to effectively enhance network resource utilization and secure steady-state performance of networked switched systems. iii) Typical cyber attacks have unique consequences on the secure steady-state performance of networked switched systems with severely unstable dynamics due to the short activation time of a single subsystem and the necessity to relay the switching signal through the network. To this purpose, the consecutive asynchronous switching behaviors of the subsystem or controller resulting from a long-duration DoS attack or an integrity deception attack incorporating switching signal tampering are investigated. iv) To deal with the transient performance fluctuations of the closed-loop system caused by factors such as mismatch switching between the subsystem and the corresponding controller, data update at event-triggering instants, cyber attack blocking and tampering of transmitted data, etc., bumpless transfer control strategies are formulated in the interpolation type and multi-source type, balancing the transient and steady-state performances of the output regulation of networked switched systems. This book presents these topics in a systematic way, which is of tremendous importance to both theoretical research and practical applications involving switched systems. 001471854 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 19, 2023). 001471854 650_0 $$aComputer networks$$xSecurity measures. 001471854 650_0 $$aComputer security. 001471854 655_0 $$aElectronic books. 001471854 7001_ $$aFu, Jun,$$eauthor. 001471854 77608 $$iPrint version:$$aLi, Lili$$tOutput Regulation and Cybersecurity of Networked Switched Systems$$dCham : Springer,c2023$$z9783031309717 001471854 830_0 $$aStudies in systems, decision and control ;$$vv. 475.$$x2198-4190 001471854 852__ $$bebk 001471854 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-30972-4$$zOnline Access$$91397441.1 001471854 909CO $$ooai:library.usi.edu:1471854$$pGLOBAL_SET 001471854 980__ $$aBIB 001471854 980__ $$aEBOOK 001471854 982__ $$aEbook 001471854 983__ $$aOnline 001471854 994__ $$a92$$bISE