Security of cyber-physical systems:
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the appli...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
[2022]
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems. |
Beschreibung: | Titelrückseite: This is a reprint of articles from the Special Issue published online in the open access journal Electronics (ISSN 2079-9292) (available at: www.mdpi.com/journal/electronics/special_issues/security_cps_1). |
Beschreibung: | 1 Online-Ressource (vii, 221 Seiten) |
ISBN: | 9783036541457 |
DOI: | 10.3390/books978-3-0365-4145-7 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV048450041 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220831s2022 |||| o||u| ||||||eng d | ||
020 | |a 9783036541457 |9 978-3-0365-4145-7 | ||
024 | 7 | |a 10.3390/books978-3-0365-4145-7 |2 doi | |
035 | |a (OCoLC)1344254685 | ||
035 | |a (DE-599)HEB497484846 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-210 |a DE-521 |a DE-1102 |a DE-1046 |a DE-1028 |a DE-1050 |a DE-573 |a DE-M347 |a DE-92 |a DE-1051 |a DE-898 |a DE-859 |a DE-860 |a DE-1049 |a DE-863 |a DE-862 |a DE-Re13 |a DE-Y3 |a DE-255 |a DE-Y7 |a DE-Y2 |a DE-70 |a DE-2174 |a DE-127 |a DE-22 |a DE-155 |a DE-91 |a DE-384 |a DE-473 |a DE-19 |a DE-355 |a DE-703 |a DE-20 |a DE-706 |a DE-824 |a DE-29 |a DE-739 | ||
084 | |a ST 153 |0 (DE-625)143597: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ZG 9287 |0 (DE-625)156058: |2 rvk | ||
245 | 1 | 0 | |a Security of cyber-physical systems |c editor Arman Sargolzaei |
264 | 1 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c [2022] | |
264 | 2 | |a The Hague |b OAPEN FOUNDATION | |
300 | |a 1 Online-Ressource (vii, 221 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Titelrückseite: This is a reprint of articles from the Special Issue published online in the open access journal Electronics (ISSN 2079-9292) (available at: www.mdpi.com/journal/electronics/special_issues/security_cps_1). | ||
520 | 3 | |a Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems. | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyber-physisches System |0 (DE-588)1069505412 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
653 | |a smart grids | ||
653 | |a device authentication | ||
653 | |a situational awareness | ||
653 | |a home area networks | ||
653 | |a time-delay switch attack | ||
653 | |a networked control systems | ||
653 | |a secure control design | ||
653 | |a Lyapunov theory | ||
653 | |a attack estimation | ||
653 | |a hardware-in-the-loop testing | ||
653 | |a machine learning | ||
653 | |a industrial control systems | ||
653 | |a anomaly detection | ||
653 | |a fault detection | ||
653 | |a intrusion detection system | ||
653 | |a blockchain | ||
653 | |a security | ||
653 | |a privacy | ||
653 | |a financial transactions | ||
653 | |a transportation systems | ||
653 | |a autonomous vehicles | ||
653 | |a power system resilience | ||
653 | |a disaster | ||
653 | |a Federated Learning | ||
653 | |a edge intelligence | ||
653 | |a resilience management systems | ||
653 | |a resource-limitations | ||
653 | |a demand response | ||
653 | |a remedial testing | ||
653 | |a greybox fuzzing | ||
653 | |a vulnerability detection | ||
653 | |a enhanced security | ||
653 | |a traffic microsimulation tool | ||
653 | |a cooperative automated driving systems | ||
653 | |a vehicle powertrain | ||
653 | |a safety | ||
653 | |a road capacity | ||
653 | |a contested environments | ||
653 | |a anomaly isolation | ||
653 | |a artificial neural networks | ||
653 | |a Cyber Physical System | ||
653 | |a out-of-bounds | ||
653 | |a vulnerable detection | ||
653 | |a patch | ||
653 | |a inverter-based energy resources | ||
653 | |a islanded microgrids | ||
653 | |a resilient control design | ||
653 | |a secondary control | ||
653 | |a false data injection | ||
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Cyber-physisches System |0 (DE-588)1069505412 |D s |
689 | 0 | 1 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 2 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sargolzaei, Arman |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-3-0365-4146-4 |
856 | 4 | 0 | |u https://directory.doabooks.org/handle/20.500.12854/84465 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://doi.org/10.3390/books978-3-0365-4145-7 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-94-OAB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033828206 |
Datensatz im Suchindex
_version_ | 1813306137259278336 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Sargolzaei, Arman |
author2_role | edt |
author2_variant | a s as |
author_facet | Sargolzaei, Arman |
building | Verbundindex |
bvnumber | BV048450041 |
classification_rvk | ST 153 ST 277 ZG 9287 |
collection | ZDB-94-OAB |
ctrlnum | (OCoLC)1344254685 (DE-599)HEB497484846 |
discipline | Technik Informatik |
discipline_str_mv | Technik Informatik |
doi_str_mv | 10.3390/books978-3-0365-4145-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a22000001c 4500</leader><controlfield tag="001">BV048450041</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220831s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783036541457</subfield><subfield code="9">978-3-0365-4145-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3390/books978-3-0365-4145-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1344254685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HEB497484846</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-210</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-Re13</subfield><subfield code="a">DE-Y3</subfield><subfield code="a">DE-255</subfield><subfield code="a">DE-Y7</subfield><subfield code="a">DE-Y2</subfield><subfield code="a">DE-70</subfield><subfield code="a">DE-2174</subfield><subfield code="a">DE-127</subfield><subfield code="a">DE-22</subfield><subfield code="a">DE-155</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 153</subfield><subfield code="0">(DE-625)143597:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZG 9287</subfield><subfield code="0">(DE-625)156058:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of cyber-physical systems</subfield><subfield code="c">editor Arman Sargolzaei</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">The Hague</subfield><subfield code="b">OAPEN FOUNDATION</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vii, 221 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Titelrückseite: This is a reprint of articles from the Special Issue published online in the open access journal Electronics (ISSN 2079-9292) (available at: www.mdpi.com/journal/electronics/special_issues/security_cps_1).</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart grids</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">device authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">situational awareness</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">home area networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">time-delay switch attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">networked control systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure control design</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Lyapunov theory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack estimation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hardware-in-the-loop testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industrial control systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">anomaly detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">fault detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">blockchain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">financial transactions</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transportation systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">autonomous vehicles</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">power system resilience</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">disaster</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Federated Learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">edge intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resilience management systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resource-limitations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">demand response</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">remedial testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">greybox fuzzing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">vulnerability detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">enhanced security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">traffic microsimulation tool</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cooperative automated driving systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">vehicle powertrain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">safety</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">road capacity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">contested environments</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">anomaly isolation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">artificial neural networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Physical System</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">out-of-bounds</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">vulnerable detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">patch</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">inverter-based energy resources</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">islanded microgrids</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resilient control design</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secondary control</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">false data injection</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sargolzaei, Arman</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-3-0365-4146-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://directory.doabooks.org/handle/20.500.12854/84465</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3390/books978-3-0365-4145-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-94-OAB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033828206</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV048450041 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:30:27Z |
indexdate | 2024-10-19T04:04:50Z |
institution | BVB |
isbn | 9783036541457 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033828206 |
oclc_num | 1344254685 |
open_access_boolean | 1 |
owner | DE-12 DE-210 DE-521 DE-1102 DE-1046 DE-1028 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-1049 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-Re13 DE-BY-UBR DE-Y3 DE-255 DE-Y7 DE-Y2 DE-70 DE-2174 DE-127 DE-22 DE-BY-UBG DE-155 DE-BY-UBR DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 |
owner_facet | DE-12 DE-210 DE-521 DE-1102 DE-1046 DE-1028 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-1049 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-Re13 DE-BY-UBR DE-Y3 DE-255 DE-Y7 DE-Y2 DE-70 DE-2174 DE-127 DE-22 DE-BY-UBG DE-155 DE-BY-UBR DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 |
physical | 1 Online-Ressource (vii, 221 Seiten) |
psigel | ZDB-94-OAB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | MDPI - Multidisciplinary Digital Publishing Institute |
record_format | marc |
spellingShingle | Security of cyber-physical systems Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Cyber-physisches System (DE-588)1069505412 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)1069505412 (DE-588)4274324-2 (DE-588)4767762-4 (DE-588)4143413-4 |
title | Security of cyber-physical systems |
title_auth | Security of cyber-physical systems |
title_exact_search | Security of cyber-physical systems |
title_exact_search_txtP | Security of cyber-physical systems |
title_full | Security of cyber-physical systems editor Arman Sargolzaei |
title_fullStr | Security of cyber-physical systems editor Arman Sargolzaei |
title_full_unstemmed | Security of cyber-physical systems editor Arman Sargolzaei |
title_short | Security of cyber-physical systems |
title_sort | security of cyber physical systems |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Cyber-physisches System (DE-588)1069505412 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
topic_facet | Kritische Informationsinfrastruktur Cyber-physisches System Computersicherheit Sicherheitskritisches System Aufsatzsammlung |
url | https://directory.doabooks.org/handle/20.500.12854/84465 https://doi.org/10.3390/books978-3-0365-4145-7 |
work_keys_str_mv | AT sargolzaeiarman securityofcyberphysicalsystems |