This is a test
- 444 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Securing Cyber-Physical Systems
Book details
Table of contents
Citations
About This Book
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deploy
Frequently asked questions
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoâs features. The only differences are the price and subscription period: With the annual plan youâll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Securing Cyber-Physical Systems by Al-Sakib Khan Pathan in PDF and/or ePUB format, as well as other popular books in Informatica & Tecnologia dell'informazione. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Cover
- Half-Title Page
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Preface
- Acknowledgment
- Editors
- Contributors
- Chapter 1: Securing Power Systems
- Chapter 2: ICT Modeling for Cosimulation of Integrated Cyberpower Systems
- Chapter 3: Moving Target Defense Mechanisms in Cyber-Physical Systems
- Chapter 4: Ontological FrameworkâAssisted Embedded System Design with Security Consideration in a Cyber-Physical Power System Environment
- Chapter 5: WSNProtectLayer Security Middleware for Wireless Sensor Networks
- Chapter 6: Securing Transportation Cyber-Physical Systems
- Chapter 7: Securing the Future Autonomous Vehicle A Cyber-Physical Systems Approach
- Chapter 8: A Study of Security Issues, Vulnerabilities, and Challenges in the Internet of Things
- Chapter 9: Security and Privacy in the IPv6-Connected Internet of Things
- Chapter 10: Security Issues and Approaches in M2M Communications
- Chapter 11: Securing Embedded Systems Cyberattacks, Countermeasures, and Challenges
- Chapter 12: Using Software-Defined Networking to Mitigate Cyberattacks in Industrial Control Systems
- Chapter 13: Tackling Cross-Site Scripting (XSS) Attacks in Cyberspace
- Chapter 14: Trojan-Resilient Circuits
- Chapter 15: Intrusion Detection, Prevention, and Response System (IDPRS) for Cyber-Physical Systems (CPSs)
- Chapter 16: Security-Integrated Quality-of-Service Paradigm for Cyber-Physical Systems
- Index