- Table View
- List View
Cyber-Physical Systems: Digital Technologies and Applications (Studies in Systems, Decision and Control #350)
by Alla G. Kravets Alexander A. Bolshakov Maxim V. ShcherbakovThis book offers ideas to help improve digital technologies and increase their efficiency during implementation and application for researchers and practitioners. The outstanding position of the book among others is that it dwells with cyber-physical systems’ progress and proposes ideas and finding around digital tools and technologies and their application. A distinguished contribution is in presenting results on Digital Twins development and application, enhancing approaches of communication and information transferring between cyber-physical systems connected within the Internet of things platforms, computer linguistic as a part of cyber-physical systems, intelligent cybersecurity and computer vision systems. The target audience of this book also includes practitioners and experts, as well as state authorities and representatives of manufacturing and industry who are interested in creating and implementing of cyber-physical systems in framework of digitalization projects.
Cyber-Physical Systems: From Theory to Practice
by Ivan Stojmenovic Danda B. Rawat Joel J.P.C. RodriguesAlthough comprehensive knowledge of cyber-physical systems (CPS) is becoming a must for researchers, practitioners, system designers, policy makers, system managers, and administrators, there has been a need for a comprehensive and up-to-date source of research and information on cyber-physical systems. This book fills that need.Cyber-Physical Syst
Cyber-Physical Systems: Industry 4.0 Challenges (Studies in Systems, Decision and Control #260)
by Alla G. Kravets Alexander A. Bolshakov Maxim V. ShcherbakovThis book presents new findings in industrial cyber-physical system design and control for various domains, as well as their social and economic impacts on society. Industry 4.0 requires new approaches in the context of secure connections, control, and maintenance of cyber-physical systems as well as enhancing their interaction with humans. The book focuses on open issues of cyber-physical system control and its usage, discussing implemented breakthrough systems, models, programs, and methods that could be used in industrial processes for the control, condition assessment, diagnostics, prognostication, and proactive maintenance of cyber-physical systems. Further, it addresses the topic of ensuring the cybersecurity of industrial cyber-physical systems and proposes new, reliable solutions. The authors also examine the impact of university courses on the performance of industrial complexes, and the organization of education for the development of cyber-physical systems. The book is intended for practitioners, enterprise representatives, scientists, students, and Ph.D. and master’s students conducting research in the area of cyber-physical system development and implementation in various domains.
Cyber-Physical Systems: Industry 4.0 to Industry 5.0 Transition (Studies in Systems, Decision and Control #560)
by Alla G. Kravets Alexander A. BolshakovThis book presents a comprehensive overview of the latest advancements in the field of cyber-physical systems, focusing on the transition from Industry 4.0 to Industry 5.0. This transition emphasizes the increased role of humans in the manufacturing process, the introduction of new technologies, and improvements in management and security. The book covers various topics, including neural network and synergetic approaches to solving problems, decentralized identifiers methods classification, identification of technological opportunities for enterprises, and cybernetic technologies to counter passive and active cyberattacks. This book is an essential resource for researchers, engineers, and students interested in the field of cyber-physical systems, as well as for professionals working in industries that are undergoing the transition from Industry 4.0 to Industry 5.0.
Cyber-Physical Systems: Integrated Computing and Engineering Design
by Fei HuThis book supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there. Covering the most important design theories and modeling methods for a practical CPS, text presents concrete CPS designs for popular civilian applications, including building and energy management.Reflecting the importance of human health care in society, it includes CPS examples of rehabilitation applications such as virtual reality-based disability recovery platforms.
Cyber-Physical Systems: Intelligent Models and Algorithms (Studies in Systems, Decision and Control #417)
by Maxim Shcherbakov Alla G. Kravets Alexander A. BolshakovThis book is devoted to intelligent models and algorithms as the core components of cyber-physical systems. The complexity of cyber-physical systems developing and deploying requires new approaches to its modelling and design. Presents results in the field of modelling technologies that leverage the exploitation of artificial intelligence, including artificial general intelligence (AGI) and weak artificial intelligence. Provides scientific, practical, and methodological approaches based on bio-inspired methods, fuzzy models and algorithms, predictive modelling, computer vision and image processing. The target audience of the book are practitioners, enterprises representatives, scientists, PhD and Master students who perform scientific research or applications of intelligent models and algorithms in cyber-physical systems for various domains.
Cyber-Physical Systems: Modelling and Industrial Application (Studies in Systems, Decision and Control #418)
by Maxim Shcherbakov Alla G. Kravets Alexander A. BolshakovThis book discusses the open questions regarding the modelling of cyber-physical systems and their application in different industries. The industry needs new approaches to improve its competitiveness. The concept of cyber-physical systems supports such changes, with the need to find new modelling tools becoming a key challenge. The book contains five-section covering the following topics: cyber-physical systems modelling, IoT and signal processing, cyber-physical systems intelligent control, cyber-physical systems industrial implementation and the production of the new material for cyber-physical systems. These approaches, on the one hand, should ensure the execution of current business processes, and on the other hand, ensure a quick speed of reactions to changes. The target audience of the book are practitioners, enterprises representatives, scientists, PhD and Master students who perform scientific research on modelling and industrial application of cyber-physical systems.
Cyber-Physical Systems: Modelling and Intelligent Control (Studies in Systems, Decision and Control #338)
by Maxim Shcherbakov Alla G. Kravets Alexander A. BolshakovThis book highlights original approaches of modelling and intelligent control of cyber-physical systems covering both theoretical and practical aspects. The novel contribution of the book covers the transformation of scientific research and their results into applications for cyber-physical systems design and operation during the whole life cycle in different domains. Given its scope, the book offers an excellent reference book for researchers and other readers in the fields of cyber-physical systems modelling and intelligent control, space exploration and practical implementation of cyber-physical systems. The book also benefits researchers and practitioners in artificial intelligence and machine learning, as described results can be applied in cyber-physical systems design and cost-effectively maintenance. The target audience of this book also includes practitioners and experts, as well as state authorities and representatives of international organizations interested in creating mechanisms for implementing Cyber-Physical Systems projects.
Cyber-Physical Virtual Power Plants: Modeling, Operation, and Control (Power Systems)
by Chongqing Kang Qixin Chen Hongye Guo Kedi Zheng Cheng FengCyber-physical Virtual Power Plants (VPPs), a revolutionary framework designed to harness the collective potential of distributed energy resources (DERs) via communication technologies, are crucial for integrating large of renewable generators into future energy grids securely and cost-effectively. This is the pioneering book that systematically explains and explores the operation and control of VPPs from a cyber-physical perspective. Born out of the authors&’ continuous research and engineering practice in the field of VPPs, this book lays the theoretical foundation for the topic and thoroughly presents straightforward solutions to the challenges encountered in cyber-physical VPPs. This book is a useful reference for researchers, graduates, and engineers interested in and working on VPPs, cyber-physical system designs, and Internet of Things applications.
Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0
by Vishal Bhatnagar Vikram Bali Mario José Diván Deepti Aggarwal Shivani BaliThis book addresses topics related to the Internet of Things (IoT), machine learning, cyber-physical systems, cloud computing, and autonomous vehicles in Industry 4.0. It investigates challenges across multiple sectors and industries and considers Industry 4.0 for operations research and supply chain management.Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0 encourages readers to develop novel theories and enrich their knowledge to foster sustainability. It examines the recent research trends and the future of cyber-physical systems, IoT, and autonomous systems as they relate to Industry 4.0. This book is intended for undergraduates, postgraduates, academics, researchers, and industry individuals to explore new ideas, techniques, and tools related to Industry 4.0.
Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership)
by Anuradha M. Annaswamy Sarah K. Spurgeon Pramod P. Khargonekar Françoise Lamnabhi‐LagarrigueCyber–Physical–Human Systems A comprehensive edited volume exploring the latest in the interactions between cyber–physical systems and humans In Cyber–Physical–Human Systems: Fundamentals and Applications, a team of distinguished researchers delivers a robust and up-to-date volume of contributions from leading researchers on Cyber–Physical–Human Systems, an emerging class of systems with increased interactions between cyber–physical, and human systems communicating with each other at various levels across space and time, so as to achieve desired performance related to human welfare, efficiency, and sustainability. The editors have focused on papers that address the power of emerging CPHS disciplines, all of which feature humans as an active component during cyber and physical interactions. Articles that span fundamental concepts and methods to various applications in engineering sectors of transportation, robotics, and healthcare and general socio-technical systems such as smart cities are featured. Together, these articles address challenges and opportunities that arise due to the emerging interactions between cyber–physical systems and humans, allowing readers to appreciate the intersection of cyber–physical system research and human behavior in large-scale systems. In the book, readers will also find: A thorough introduction to the fundamentals of cyber–physical–human systems In-depth discussions of cyber–physical–human systems with applications in transportation, robotics, and healthcare A comprehensive treatment of socio-technical systems, including social networks and smart cities Perfect for cyber–physical systems researchers, academics, and graduate students, Cyber–Physical–Human Systems: Fundamentals and Applications will also earn a place in the libraries of research and development professionals working in industry and government agencies.
Cyber-Proletariat: Global Labour in the Digital Vortex
by Nick Dyer-WithefordThe utopian promise of the internet, much talked about even a few years ago, has given way to brutal realities: coltan mines in the Congo, electronics factories in China, devastated neighborhoods in Detroit. Cyber-Proletariat shows us the dark-side of the information revolution through an unsparing analysis of class power and computerization. Dyer-Witheford investigates how technology facilitates growing polarization between wealthy elites and precarious workers. He reveals the class domination behind everything from expanding online surveillance to intensifying robotization. At the same time, he looks at possibilities for information technology within radical movements.
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
by Indrajit Ray Quanyan Zhu Carol Smidts Pavan Kumar Vaddi Yunfei Zhao Linan Huang Xiaoxu Diao Rakibul Talukdar Michael C. PietrykowskiThis SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.
Cyber-Security Threats, Actors, and Dynamic Mitigation
by Stavros Shiaeles Nicholas KolokotronisCyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.
Cyber-Security for Smart Grid Control: Vulnerability Assessment, Attack Detection, and Mitigation (Transactions on Computer Systems and Networks)
by K. Shanti Swarup Amulya SreejithThe book focuses on a very important area of Smart Grids - cyber security. It deals in particular with the tools and techniques for cyber security analysis of the Smart Grid control systems. This includes the standards and guidelines, detailed vulnerability assessment framework, attack detection strategies, and attack mitigation methods. The book is divided into three parts. The smart grid cyber-physical system is discussed in the first part. The second part introduces the attacks in the grid system and a vulnerability assessment framework followed by a tool that can be used to analyze the grid control systems using existing cyber security standards. In the third part, different forms of attack detection methods are discussed along with Python-based implementations for the same. The book also discusses attack mitigation methods with implementation. Detailed illustrations and tables are provided in each section. The book also includes case studies based on standard test systems thushelping students to implement the discussed methods. The case studies are based on MATLAB and Python implementations thus catering to a wide range of audiences. Outputs and screenshots of the tools and programs are included so students can compare their results and improve upon the discussed methods. The book will be useful to a wide variety of audiences such as students and researchers in Smart Grids, power system operators, and device manufacturers.
Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)
by Quanyan Zhu Stefan Rass Stefan Schauer Sandra KönigThis book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors’ experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.
Cyber-physische Produktionssysteme für die energieeffiziente Komponentenproduktion (AutoUni – Schriftenreihe #152)
by Ingo LabbusDie vorliegende Dissertation präsentiert ein Konzept für den Einsatz cyber-physischer Produktionssysteme zur Steigerung der Energieeffizienz in der Komponentenproduktion. Das entwickelte Konzept integriert dafür Ansätze zu Datenmodellierung, -aufbereitung, und -analyse sowie Werkzeuge zur Planung energieeffizienter Produktionen. Dieses ermöglicht die Herstellung der Datendurchgängigkeit zwischen Planung und Betrieb der Produktion, erhöht die Transparenz über aktuelle Energiebedarfe sowie Einsparpotenziale und erleichtert so die Planung energieeffizienter Produktionen. Die Entwicklung und Anwendung des Konzeptes erfolgt am Beispiel der Fertigung von Komponenten für die Automobilproduktion.
Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security #66)
by Alexander Kott Edward J. M. ColbertThis book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats? This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
CyberBRICS: Cybersecurity Regulations in the BRICS Countries
by Luca BelliThis book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries – namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense.The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.
CyberMedics: Navigating AI and Security in the Medical Field
by Rohit Tanwar Varun Sapra Luxmi SapraCyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world. As AI technologies revolutionize diagnostics, treatment planning, and patient care, they also introduce new challenges related to data privacy, ethical considerations, and cybersecurity. This book offers a balanced perspective, providing healthcare professionals, technologists, and policymakers with the tools they need to understand and navigate the intersection of AI and security. Through detailed case studies, expert insights, and practical guidance, readers will discover how AI can be leveraged to improve patient outcomes while maintaining the highest standards of data protection.Key topics include: AI in healthcare, exploring how emerging technologies like machine learning, natural language processing, and predictive analytics are poised to reshape the industry the ethical implications of AI in healthcare strategies for safeguarding sensitive information against cyber threats future frameworks governing the use of AI in medical settings Whether you’re on the front lines of patient care, involved in healthcare IT, or shaping policy, CyberMedics: Navigating AI and Security in the Medical Field equips you with the knowledge to make informed decisions in a rapidly evolving landscape, ensuring that innovation and security go hand in hand to enhance the quality of care.
CyberPhysical Systems: Decision Making Mechanisms and Applications (River Publishers Series In Circuits And Systems Is A Series Of Comprehensive Academic And Professional Books Which Focus On Theory And Applications Of Circuit And Systems. This Includes Analog And Digital Integrated Circuits, Memory Technologies, System-on-chip And Processor Design. The Series Also Includes Books On Electronic Design Automation And Design Methodology, As Well As Computer Aided Des)
by Dimitrios Soudris Kostas Siozios Elias KosmatopoulosAs systems continue to evolve they rely less on human decision-making and more on computational intelligence. This trend in conjunction to the available technologies for providing advanced sensing, measurement, process control, and communication lead towards the new field of Cyber-Physical System (CPS). Cyber-physical systems are expected to play a major role in the design and development of future engineering platforms with new capabilities that far exceed today’s levels of autonomy, functionality and usability. Although these systems exhibit remarkable characteristics, their design and implementation is a challenging issue, as numerous (heterogeneous) components and services have to be appropriately modeled and simulated together. The problem of designing efficient CPS becomes far more challenging in case the target system has to meet also real-time constraints.CyberPhysical Systems: Decision Making Mechanisms and Applications describes essential theory, recent research and large-scale usecases that addresses urgent challenges in CPS architectures. In particular, it includes chapters on:• Decision making for large scale CPS• Modeling of CPS with emphasis at the control mechanisms• Hardware/software implementation of the control mechanisms• Fault-tolerant and reliability issues for the control mechanisms• Cyberphysical user-cases that incorporate challenging decision making
CyberSecurity in a DevOps Environment: From Requirements to Monitoring
by Cristina Seceleanu Ana Rosa Cavalli Andrey Sadovykh Dragos Truscan Wissam Mallouli Alessandra BagnatoThis book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring. It presents an overview of the latest techniques and tools that help engineers and developers verify the security requirements of large-scale industrial systems and explains novel methods that enable a faster feedback loop for verifying security-related activities, which rely on techniques such as automated testing, model checking, static analysis, runtime monitoring, and formal methods. The book consists of three parts, each covering a different aspect of security engineering in the DevOps context. The first part, "Security Requirements", explains how to specify and analyse security issues in a formal way. The second part, "Prevention at Development Time", offers a practical and industrial perspective on how to design, develop and verify secure applications. The third part, "Protection at Operations", eventually introduces tools for continuous monitoring of security events and incidents. Overall, it covers several advanced topics related to security verification, such as optimizing security verification activities, automatically creating verifiable specifications from security requirements and vulnerabilities, and using these security specifications to verify security properties against design specifications and generate artifacts such as tests or monitors that can be used later in the DevOps process. The book aims at computer engineers in general and does not require specific knowledge. In particular, it is intended for software architects, developers, testers, security professionals, and tool providers, who want to define, build, test, and verify secure applications, Web services, and industrial systems.
Cyberactivism: Online Activism in Theory and Practice (Routledge Studies In New Media And Cyberculture Ser.)
by Martha McCaughey Michael D. AyersCyberactivism is a timely collection of essays examining the growing importance of online activism. The contributors show how online activists have not only incorporated recent technology as a tool for change, but also how they have changed the meaning of activism, what community means, and how they conceive of collective identity and democratic change. Topics addressed range from the Zapatista movement's use of the web to promote their cause globally to the establishment of alternative media sources like indymedia.org to the direct action of "hacktivists" who disrupt commercial computer networks. Cyberactivism is essential reading for anyone interested in understanding the impact of the Internet on politics today.
Cyberbiosecurity: A New Field to Deal with Emerging Threats
by Dov GreenbaumBiocybersecurity applies cybersecurity research to the field of biology, and, to a lesser degree, applies biological principles to the field of cybersecurity. As biologists increasingly research, collaborate, and conduct research online, biocybersecurity has become crucial to protect against cyber threats. This book provides an overview of biocybersecurity through the lens of researchers in academia, industry professionals, and government, in both biology and cybersecurity fields. The book highlights emerging technologies, and identifies emerging threats connected with these technologies, while also providing a discussion of the legal implications involved.This book takes on a multidisciplinary approach, and appeals to both professionals and researchers in the synthetic biology, bioinformatics, and cybersecurity fields.
Cybercomplexity: A Macroscopic View of Cybersecurity Risk (Advanced Sciences and Technologies for Security Applications)
by Carl S. YoungThis book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.