Security in Cyber-Physical Systems: Foundations and Applications
This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area.Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of softwa...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | 339 |
creator | Awad, Ali Ismail Furnell, Steven Paprzycki, Marcin Sharma, Sudhir Kumar |
description | This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area.Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from considering individual Internet-of-Things devices through to large-scale infrastructures. Presented across ten chapters authored by international researchers in the field from both academia and industry, this book offers a series of high-quality contributions that collectively address and analyze the state of the art in the security of Cyber-Physical Systems and related technologies. The chapters themselves include an effective mix of theory and applied content, supporting an understanding of the underlying security issues in the CPSs domain, alongside related coverage of the technological advances and solutions proposed to address them. The chapters comprising the later portion of the book are specifically focused upon a series of case examples, evidencing how the protection concepts can translate into practical application. |
doi_str_mv | 10.1007/978-3-030-67361-1 |
format | Book |
fullrecord | <record><control><sourceid>proquest_swepu</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9783030673611</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC6511450</sourcerecordid><originalsourceid>FETCH-LOGICAL-a15432-f890e774e34c103243ff7f26418d907bebf481f15b8acd00d3bb4862be62a8463</originalsourceid><addsrcrecordid>eNpVkEtLw0AUhccntrU_wF1xI4Jj7zwymSxrrA8oKFSKu2EmnbSxsakziSX_3vSh4OrCOd85XA5CFwRuCUDYj0KJGQYGWIRMEEwOULfRWKNsBXKIWpREEnMSwRFq_xrwfvxnSHqK2oTyQIiQAz9DXe8_AIAGQAVELXQ5tknlsrLuZcteXBvr8Ou89lmi89649qX99OfoJNW5t9397aDJw_AtfsKjl8fneDDCmgScUZzKCGwYcst4QoBRztI0TKlovphGEBprUi5JSgIjdTIFmDJjuBTUWEG15IJ10M2u2K_tqjJq5bJP7WpV6EzdZ5OBKtxM5WWlJAsEb_DrHa79wq79vMhLr75za4pi4dW_pRq2v69uSpcz69SOIqA2W29oxVTDq21AbRJXu8TKFV-V9aXaFid2WTqdq-FdLAJCeADsB-qkdLw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC6511450</pqid></control><display><type>book</type><title>Security in Cyber-Physical Systems: Foundations and Applications</title><source>Springer Books</source><creator>Awad, Ali Ismail ; Furnell, Steven ; Paprzycki, Marcin ; Sharma, Sudhir Kumar</creator><contributor>Awad, Ali Ismail ; Furnell, Steven ; Sharma, Sudhir Kumar ; Paprzycki, Marcin ; Paprzycki, Marcin ; Sharma, Sudhir Kumar ; Furnell, Steven ; Awad, Ali Ismail</contributor><creatorcontrib>Awad, Ali Ismail ; Furnell, Steven ; Paprzycki, Marcin ; Sharma, Sudhir Kumar ; Awad, Ali Ismail ; Furnell, Steven ; Sharma, Sudhir Kumar ; Paprzycki, Marcin ; Paprzycki, Marcin ; Sharma, Sudhir Kumar ; Furnell, Steven ; Awad, Ali Ismail</creatorcontrib><description>This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area.Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from considering individual Internet-of-Things devices through to large-scale infrastructures. Presented across ten chapters authored by international researchers in the field from both academia and industry, this book offers a series of high-quality contributions that collectively address and analyze the state of the art in the security of Cyber-Physical Systems and related technologies. The chapters themselves include an effective mix of theory and applied content, supporting an understanding of the underlying security issues in the CPSs domain, alongside related coverage of the technological advances and solutions proposed to address them. The chapters comprising the later portion of the book are specifically focused upon a series of case examples, evidencing how the protection concepts can translate into practical application. </description><edition>1</edition><identifier>ISSN: 2198-4182</identifier><identifier>ISBN: 303067360X</identifier><identifier>ISBN: 9783030673604</identifier><identifier>EISSN: 2198-4190</identifier><identifier>EISBN: 9783030673611</identifier><identifier>EISBN: 3030673618</identifier><identifier>DOI: 10.1007/978-3-030-67361-1</identifier><identifier>OCLC: 1245667404</identifier><language>eng</language><publisher>Cham: Springer International Publishing AG</publisher><subject>Blockchains ; Computational Intelligence ; Computer engineering ; Cooperating objects (Computer systems) ; CPSs ; Cyber-Physical Systems ; Cyber-physical systems, IoT ; Data Security ; Engineering ; Information systems ; Informationssystem ; Privacy Defense Mechanisms ; Risk Assessments</subject><creationdate>2021</creationdate><tpages>323</tpages><format>323</format><rights>Springer Nature Switzerland AG 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Studies in Systems, Decision and Control</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://media.springernature.com/w306/springer-static/cover-hires/book/978-3-030-67361-1</thumbnail><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-030-67361-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>306,307,780,784,786,885,4048,27925,38255,42511</link.rule.ids><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83564$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><contributor>Awad, Ali Ismail</contributor><contributor>Furnell, Steven</contributor><contributor>Sharma, Sudhir Kumar</contributor><contributor>Paprzycki, Marcin</contributor><contributor>Paprzycki, Marcin</contributor><contributor>Sharma, Sudhir Kumar</contributor><contributor>Furnell, Steven</contributor><contributor>Awad, Ali Ismail</contributor><creatorcontrib>Awad, Ali Ismail</creatorcontrib><creatorcontrib>Furnell, Steven</creatorcontrib><creatorcontrib>Paprzycki, Marcin</creatorcontrib><creatorcontrib>Sharma, Sudhir Kumar</creatorcontrib><title>Security in Cyber-Physical Systems: Foundations and Applications</title><description>This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area.Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from considering individual Internet-of-Things devices through to large-scale infrastructures. Presented across ten chapters authored by international researchers in the field from both academia and industry, this book offers a series of high-quality contributions that collectively address and analyze the state of the art in the security of Cyber-Physical Systems and related technologies. The chapters themselves include an effective mix of theory and applied content, supporting an understanding of the underlying security issues in the CPSs domain, alongside related coverage of the technological advances and solutions proposed to address them. The chapters comprising the later portion of the book are specifically focused upon a series of case examples, evidencing how the protection concepts can translate into practical application. </description><subject>Blockchains</subject><subject>Computational Intelligence</subject><subject>Computer engineering</subject><subject>Cooperating objects (Computer systems)</subject><subject>CPSs</subject><subject>Cyber-Physical Systems</subject><subject>Cyber-physical systems, IoT</subject><subject>Data Security</subject><subject>Engineering</subject><subject>Information systems</subject><subject>Informationssystem</subject><subject>Privacy Defense Mechanisms</subject><subject>Risk Assessments</subject><issn>2198-4182</issn><issn>2198-4190</issn><isbn>303067360X</isbn><isbn>9783030673604</isbn><isbn>9783030673611</isbn><isbn>3030673618</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2021</creationdate><recordtype>book</recordtype><recordid>eNpVkEtLw0AUhccntrU_wF1xI4Jj7zwymSxrrA8oKFSKu2EmnbSxsakziSX_3vSh4OrCOd85XA5CFwRuCUDYj0KJGQYGWIRMEEwOULfRWKNsBXKIWpREEnMSwRFq_xrwfvxnSHqK2oTyQIiQAz9DXe8_AIAGQAVELXQ5tknlsrLuZcteXBvr8Ou89lmi89649qX99OfoJNW5t9397aDJw_AtfsKjl8fneDDCmgScUZzKCGwYcst4QoBRztI0TKlovphGEBprUi5JSgIjdTIFmDJjuBTUWEG15IJ10M2u2K_tqjJq5bJP7WpV6EzdZ5OBKtxM5WWlJAsEb_DrHa79wq79vMhLr75za4pi4dW_pRq2v69uSpcz69SOIqA2W29oxVTDq21AbRJXu8TKFV-V9aXaFid2WTqdq-FdLAJCeADsB-qkdLw</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Awad, Ali Ismail</creator><creator>Furnell, Steven</creator><creator>Paprzycki, Marcin</creator><creator>Sharma, Sudhir Kumar</creator><general>Springer International Publishing AG</general><general>Springer International Publishing</general><scope>ADTPV</scope><scope>BKCIP</scope></search><sort><creationdate>2021</creationdate><title>Security in Cyber-Physical Systems</title><author>Awad, Ali Ismail ; Furnell, Steven ; Paprzycki, Marcin ; Sharma, Sudhir Kumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a15432-f890e774e34c103243ff7f26418d907bebf481f15b8acd00d3bb4862be62a8463</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Blockchains</topic><topic>Computational Intelligence</topic><topic>Computer engineering</topic><topic>Cooperating objects (Computer systems)</topic><topic>CPSs</topic><topic>Cyber-Physical Systems</topic><topic>Cyber-physical systems, IoT</topic><topic>Data Security</topic><topic>Engineering</topic><topic>Information systems</topic><topic>Informationssystem</topic><topic>Privacy Defense Mechanisms</topic><topic>Risk Assessments</topic><toplevel>online_resources</toplevel><creatorcontrib>Awad, Ali Ismail</creatorcontrib><creatorcontrib>Furnell, Steven</creatorcontrib><creatorcontrib>Paprzycki, Marcin</creatorcontrib><creatorcontrib>Sharma, Sudhir Kumar</creatorcontrib><collection>SwePub</collection><collection>SwePub Book</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Awad, Ali Ismail</au><au>Furnell, Steven</au><au>Paprzycki, Marcin</au><au>Sharma, Sudhir Kumar</au><au>Awad, Ali Ismail</au><au>Furnell, Steven</au><au>Sharma, Sudhir Kumar</au><au>Paprzycki, Marcin</au><au>Paprzycki, Marcin</au><au>Sharma, Sudhir Kumar</au><au>Furnell, Steven</au><au>Awad, Ali Ismail</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Security in Cyber-Physical Systems: Foundations and Applications</btitle><seriestitle>Studies in Systems, Decision and Control</seriestitle><date>2021</date><risdate>2021</risdate><volume>339</volume><issn>2198-4182</issn><eissn>2198-4190</eissn><isbn>303067360X</isbn><isbn>9783030673604</isbn><eisbn>9783030673611</eisbn><eisbn>3030673618</eisbn><abstract>This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area.Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from considering individual Internet-of-Things devices through to large-scale infrastructures. Presented across ten chapters authored by international researchers in the field from both academia and industry, this book offers a series of high-quality contributions that collectively address and analyze the state of the art in the security of Cyber-Physical Systems and related technologies. The chapters themselves include an effective mix of theory and applied content, supporting an understanding of the underlying security issues in the CPSs domain, alongside related coverage of the technological advances and solutions proposed to address them. The chapters comprising the later portion of the book are specifically focused upon a series of case examples, evidencing how the protection concepts can translate into practical application. </abstract><cop>Cham</cop><pub>Springer International Publishing AG</pub><doi>10.1007/978-3-030-67361-1</doi><oclcid>1245667404</oclcid><tpages>323</tpages><edition>1</edition></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2198-4182 |
ispartof | |
issn | 2198-4182 2198-4190 |
language | eng |
recordid | cdi_askewsholts_vlebooks_9783030673611 |
source | Springer Books |
subjects | Blockchains Computational Intelligence Computer engineering Cooperating objects (Computer systems) CPSs Cyber-Physical Systems Cyber-physical systems, IoT Data Security Engineering Information systems Informationssystem Privacy Defense Mechanisms Risk Assessments |
title | Security in Cyber-Physical Systems: Foundations and Applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T05%3A01%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_swepu&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Security%20in%20Cyber-Physical%20Systems:%20Foundations%20and%20Applications&rft.au=Awad,%20Ali%20Ismail&rft.date=2021&rft.volume=339&rft.issn=2198-4182&rft.eissn=2198-4190&rft.isbn=303067360X&rft.isbn_list=9783030673604&rft_id=info:doi/10.1007/978-3-030-67361-1&rft_dat=%3Cproquest_swepu%3EEBC6511450%3C/proquest_swepu%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783030673611&rft.eisbn_list=3030673618&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC6511450&rft_id=info:pmid/&rfr_iscdi=true |