Model-based attack identification in distributed nonlinear control systems:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Berlin
Technische Universität Berlin
2023
|
Schlagworte: | |
Online-Zugang: | 11303/20057 Volltext Volltext Volltext |
Beschreibung: | xiv, 201 Seiten Illustrationen, Diagramme |
DOI: | 10.14279/depositonce-18855 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049501968 | ||
003 | DE-604 | ||
005 | 20240212 | ||
007 | t | ||
008 | 240116s2023 gw a||| m||| 00||| eng d | ||
015 | |a 23,O11 |2 dnb | ||
035 | |a (OCoLC)1422478033 | ||
035 | |a (DE-599)BVBBV049501968 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |8 1\p |a 629.831 |2 23ksdnb | ||
084 | |8 2\p |a 621.3 |2 23sdnb | ||
100 | 1 | |a Braun, Sarah |e Verfasser |0 (DE-588)1319037127 |4 aut | |
245 | 1 | 0 | |a Model-based attack identification in distributed nonlinear control systems |c vorgelegt von M. Sc. Sarah Braun |
264 | 1 | |a Berlin |b Technische Universität Berlin |c 2023 | |
300 | |a xiv, 201 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Technische Universität Berlin |d 2023 | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |5 DE-101 |2 pdager | |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Robuste Regelung |0 (DE-588)4206985-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Komprimierte Abtastung |0 (DE-588)1036377245 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Modellprädiktive Regelung |0 (DE-588)1135937567 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 2 | |a Robuste Regelung |0 (DE-588)4206985-3 |D s |
689 | 0 | 3 | |a Komprimierte Abtastung |0 (DE-588)1036377245 |D s |
689 | 0 | 4 | |a Modellprädiktive Regelung |0 (DE-588)1135937567 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o 10.14279/depositonce-18855 |w (DE-604)BV049501955 |
856 | |u 11303/20057 | ||
856 | 4 | 1 | |u https://doi.org/10.14279/depositonce-18855 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://hdl.handle.net/11303/20057 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://nbn-resolving.org/urn:nbn:de:101:1-2023102502024564217311 |x Resolving-System |z kostenfrei |3 Volltext |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034847083 | ||
883 | 0 | |8 1\p |a aepkn |c 0,83312 |d 20231026 |q DE-101 |u https://d-nb.info/provenance/plan#aepkn | |
883 | 0 | |8 2\p |a emasg |c 0,50201 |d 20231026 |q DE-101 |u https://d-nb.info/provenance/plan#emasg |
Datensatz im Suchindex
_version_ | 1804186309392072704 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Braun, Sarah |
author_GND | (DE-588)1319037127 |
author_facet | Braun, Sarah |
author_role | aut |
author_sort | Braun, Sarah |
author_variant | s b sb |
building | Verbundindex |
bvnumber | BV049501968 |
classification_rvk | ST 277 |
collection | ebook |
ctrlnum | (OCoLC)1422478033 (DE-599)BVBBV049501968 |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.14279/depositonce-18855 |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02480nam a2200565zc 4500</leader><controlfield tag="001">BV049501968</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240212 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240116s2023 gw a||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">23,O11</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1422478033</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049501968</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">629.831</subfield><subfield code="2">23ksdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">2\p</subfield><subfield code="a">621.3</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Braun, Sarah</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1319037127</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Model-based attack identification in distributed nonlinear control systems</subfield><subfield code="c">vorgelegt von M. Sc. Sarah Braun</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Technische Universität Berlin</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 201 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Technische Universität Berlin</subfield><subfield code="d">2023</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="5">DE-101</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Robuste Regelung</subfield><subfield code="0">(DE-588)4206985-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Komprimierte Abtastung</subfield><subfield code="0">(DE-588)1036377245</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Modellprädiktive Regelung</subfield><subfield code="0">(DE-588)1135937567</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Robuste Regelung</subfield><subfield code="0">(DE-588)4206985-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Komprimierte Abtastung</subfield><subfield code="0">(DE-588)1036377245</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Modellprädiktive Regelung</subfield><subfield code="0">(DE-588)1135937567</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">10.14279/depositonce-18855</subfield><subfield code="w">(DE-604)BV049501955</subfield></datafield><datafield tag="856" ind1=" " ind2=" "><subfield code="u">11303/20057</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.14279/depositonce-18855</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://hdl.handle.net/11303/20057</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:101:1-2023102502024564217311</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034847083</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">aepkn</subfield><subfield code="c">0,83312</subfield><subfield code="d">20231026</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#aepkn</subfield></datafield><datafield tag="883" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">emasg</subfield><subfield code="c">0,50201</subfield><subfield code="d">20231026</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#emasg</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV049501968 |
illustrated | Illustrated |
index_date | 2024-07-03T23:21:34Z |
indexdate | 2024-07-10T10:09:05Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034847083 |
oclc_num | 1422478033 |
open_access_boolean | 1 |
owner | DE-83 |
owner_facet | DE-83 |
physical | xiv, 201 Seiten Illustrationen, Diagramme |
psigel | ebook |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Technische Universität Berlin |
record_format | marc |
spelling | Braun, Sarah Verfasser (DE-588)1319037127 aut Model-based attack identification in distributed nonlinear control systems vorgelegt von M. Sc. Sarah Braun Berlin Technische Universität Berlin 2023 xiv, 201 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Dissertation Technische Universität Berlin 2023 Archivierung/Langzeitarchivierung gewährleistet DE-101 pdager Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Robuste Regelung (DE-588)4206985-3 gnd rswk-swf Komprimierte Abtastung (DE-588)1036377245 gnd rswk-swf Modellprädiktive Regelung (DE-588)1135937567 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Verteiltes System (DE-588)4238872-7 s Eindringerkennung (DE-588)4706627-1 s Robuste Regelung (DE-588)4206985-3 s Komprimierte Abtastung (DE-588)1036377245 s Modellprädiktive Regelung (DE-588)1135937567 s DE-604 Erscheint auch als Online-Ausgabe 10.14279/depositonce-18855 (DE-604)BV049501955 11303/20057 https://doi.org/10.14279/depositonce-18855 Resolving-System kostenfrei Volltext https://hdl.handle.net/11303/20057 Resolving-System kostenfrei Volltext https://nbn-resolving.org/urn:nbn:de:101:1-2023102502024564217311 Resolving-System kostenfrei Volltext 1\p aepkn 0,83312 20231026 DE-101 https://d-nb.info/provenance/plan#aepkn 2\p emasg 0,50201 20231026 DE-101 https://d-nb.info/provenance/plan#emasg |
spellingShingle | Braun, Sarah Model-based attack identification in distributed nonlinear control systems Eindringerkennung (DE-588)4706627-1 gnd Robuste Regelung (DE-588)4206985-3 gnd Komprimierte Abtastung (DE-588)1036377245 gnd Modellprädiktive Regelung (DE-588)1135937567 gnd Verteiltes System (DE-588)4238872-7 gnd |
subject_GND | (DE-588)4706627-1 (DE-588)4206985-3 (DE-588)1036377245 (DE-588)1135937567 (DE-588)4238872-7 (DE-588)4113937-9 |
title | Model-based attack identification in distributed nonlinear control systems |
title_auth | Model-based attack identification in distributed nonlinear control systems |
title_exact_search | Model-based attack identification in distributed nonlinear control systems |
title_exact_search_txtP | Model-based attack identification in distributed nonlinear control systems |
title_full | Model-based attack identification in distributed nonlinear control systems vorgelegt von M. Sc. Sarah Braun |
title_fullStr | Model-based attack identification in distributed nonlinear control systems vorgelegt von M. Sc. Sarah Braun |
title_full_unstemmed | Model-based attack identification in distributed nonlinear control systems vorgelegt von M. Sc. Sarah Braun |
title_short | Model-based attack identification in distributed nonlinear control systems |
title_sort | model based attack identification in distributed nonlinear control systems |
topic | Eindringerkennung (DE-588)4706627-1 gnd Robuste Regelung (DE-588)4206985-3 gnd Komprimierte Abtastung (DE-588)1036377245 gnd Modellprädiktive Regelung (DE-588)1135937567 gnd Verteiltes System (DE-588)4238872-7 gnd |
topic_facet | Eindringerkennung Robuste Regelung Komprimierte Abtastung Modellprädiktive Regelung Verteiltes System Hochschulschrift |
url | 11303/20057 https://doi.org/10.14279/depositonce-18855 https://hdl.handle.net/11303/20057 https://nbn-resolving.org/urn:nbn:de:101:1-2023102502024564217311 |
work_keys_str_mv | AT braunsarah modelbasedattackidentificationindistributednonlinearcontrolsystems |