Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
Authors: Zhong-Hua Pang – Guo-Ping Liu – Donghua Zhou – Dehui Sun
ISBN-10: 9811305196
ISBN-13: 9789811305191
Edition 版次: 1st ed. 2019
Publication Date 出版日期: 2018-06-13
Print Length 页数: 219 pages
This book presents the latest results on predictive control of networked systems,where communication constraints (e.g.,network-induced delays and packet dropouts) and cyber attacks (e.g.,deception attacks and denial-of-service attacks) are considered. For the former,it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter,it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore,it uses practical experiments to demonstrate the effectiveness and applicability of all the methods,bridging the gap between control theory and practical applications. The book is of interest to academic researchers,R&D engineers,and graduate students in control engineering,networked control systems and cyber-physical systems.
contents:
….Pages i-xx
….Pages 1-1
Introduction (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 3-19
Preliminaries for Networked Predictive Control (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 21-29
….Pages 31-31
Networked Predictive Control Based on Linear Input-Output Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 33-56
Incremental Networked Predictive Control Based on Linear Input–Output Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 57-77
Networked Predictive Control Based on Nonlinear Input–Output Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 79-93
Networked Predictive Control Based on State-Space Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 95-104
Networked Predictive Output Tracking Control Based on State-Space Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 105-123
….Pages 125-125
A Data Secure Transmission Scheme for Deception Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 127-146
Secure Networked Control Under Deception Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 147-163
Secure Networked Predictive Control Under Deception Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 165-179
False Data Injection Attacks Against Networked Predictive Output Tracking Control Systems (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 181-203
Secure Networked Predictive Control Under DoS Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 205-219
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
未经允许不得转载:finelybook » Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
相关推荐
- Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment
- Mathematical Theory of Fuzzy Sets
- Practical Machine Learning A Beginner's Guide with Ethical Insights
- Cloud Native Application Protection Platforms: A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
- Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
- Data Management Strategy at Microsoft: Best practices from a tech giant's decade-long data transformation journey