Networked predictive control of systems with communication constraints and cyber attacks:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer
[2019]
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FLA01 FWS01 FWS02 TUM01 UBT01 UBY01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (xx, 219 Seiten) Illustrationen, Diagramme |
ISBN: | 9789811305207 |
DOI: | 10.1007/978-981-13-0520-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045269913 | ||
003 | DE-604 | ||
005 | 20190906 | ||
007 | cr|uuu---uuuuu | ||
008 | 181105s2019 |||| o||u| ||||||eng d | ||
020 | |a 9789811305207 |c Online |9 978-981-13-0520-7 | ||
024 | 7 | |a 10.1007/978-981-13-0520-7 |2 doi | |
035 | |a (ZDB-2-INR)9789811305207 | ||
035 | |a (OCoLC)1061556008 | ||
035 | |a (DE-599)BVBBV045269913 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-898 |a DE-91 |a DE-634 |a DE-706 |a DE-859 |a DE-522 |a DE-Aug4 |a DE-860 |a DE-862 |a DE-863 |a DE-703 |a DE-92 |a DE-573 | ||
082 | 0 | |a 629.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Pang, Zhong-Hua |e Verfasser |4 aut | |
245 | 1 | 0 | |a Networked predictive control of systems with communication constraints and cyber attacks |c Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
264 | 1 | |a Singapore |b Springer |c [2019] | |
300 | |a 1 Online-Ressource (xx, 219 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Control | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Security | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Data protection | |
700 | 1 | |a Liu, Guo-Ping |e Verfasser |4 aut | |
700 | 1 | |a Zhou, Donghua |e Verfasser |4 aut | |
700 | 1 | |a Sun, Dehui |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-13-0519-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-130-521-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-13-0520-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-INR | ||
940 | 1 | |q ZDB-2-INR_2019 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030657697 | ||
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l BFB01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l BTU01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FHA01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FHI01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FHN01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FHR01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FKE01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FLA01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FWS01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l FWS02 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l TUM01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l UBT01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l UBY01 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l UPA01 |p ZDB-2-INR |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 712505 |
---|---|
_version_ | 1806186855178174464 |
any_adam_object | |
author | Pang, Zhong-Hua Liu, Guo-Ping Zhou, Donghua Sun, Dehui |
author_facet | Pang, Zhong-Hua Liu, Guo-Ping Zhou, Donghua Sun, Dehui |
author_role | aut aut aut aut |
author_sort | Pang, Zhong-Hua |
author_variant | z h p zhp g p l gpl d z dz d s ds |
building | Verbundindex |
bvnumber | BV045269913 |
classification_rvk | ST 200 |
classification_tum | DAT 000 |
collection | ZDB-2-INR |
ctrlnum | (ZDB-2-INR)9789811305207 (OCoLC)1061556008 (DE-599)BVBBV045269913 |
dewey-full | 629.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 629 - Other branches of engineering |
dewey-raw | 629.8 |
dewey-search | 629.8 |
dewey-sort | 3629.8 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik / Mechatronik |
doi_str_mv | 10.1007/978-981-13-0520-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03192nmm a2200661zc 4500</leader><controlfield tag="001">BV045269913</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190906 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181105s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811305207</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-13-0520-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-13-0520-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-INR)9789811305207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1061556008</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045269913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">629.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pang, Zhong-Hua</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Networked predictive control of systems with communication constraints and cyber attacks</subfield><subfield code="c">Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 219 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Guo-Ping</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Donghua</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Dehui</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-13-0519-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-130-521-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-INR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-INR_2019</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030657697</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045269913 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T14:06:54Z |
institution | BVB |
isbn | 9789811305207 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030657697 |
oclc_num | 1061556008 |
open_access_boolean | |
owner | DE-739 DE-898 DE-BY-UBR DE-91 DE-BY-TUM DE-634 DE-706 DE-859 DE-522 DE-Aug4 DE-860 DE-862 DE-BY-FWS DE-863 DE-BY-FWS DE-703 DE-92 DE-573 |
owner_facet | DE-739 DE-898 DE-BY-UBR DE-91 DE-BY-TUM DE-634 DE-706 DE-859 DE-522 DE-Aug4 DE-860 DE-862 DE-BY-FWS DE-863 DE-BY-FWS DE-703 DE-92 DE-573 |
physical | 1 Online-Ressource (xx, 219 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-INR ZDB-2-INR_2019 |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
spellingShingle | Pang, Zhong-Hua Liu, Guo-Ping Zhou, Donghua Sun, Dehui Networked predictive control of systems with communication constraints and cyber attacks Control Computer Systems Organization and Communication Networks Communications Engineering, Networks Security Computer network architectures Telecommunication Data protection |
title | Networked predictive control of systems with communication constraints and cyber attacks |
title_auth | Networked predictive control of systems with communication constraints and cyber attacks |
title_exact_search | Networked predictive control of systems with communication constraints and cyber attacks |
title_full | Networked predictive control of systems with communication constraints and cyber attacks Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
title_fullStr | Networked predictive control of systems with communication constraints and cyber attacks Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
title_full_unstemmed | Networked predictive control of systems with communication constraints and cyber attacks Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
title_short | Networked predictive control of systems with communication constraints and cyber attacks |
title_sort | networked predictive control of systems with communication constraints and cyber attacks |
topic | Control Computer Systems Organization and Communication Networks Communications Engineering, Networks Security Computer network architectures Telecommunication Data protection |
topic_facet | Control Computer Systems Organization and Communication Networks Communications Engineering, Networks Security Computer network architectures Telecommunication Data protection |
url | https://doi.org/10.1007/978-981-13-0520-7 |
work_keys_str_mv | AT pangzhonghua networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks AT liuguoping networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks AT zhoudonghua networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks AT sundehui networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks |