Security-Aware Design for Cyber-Physical Systems (Record no. 77180)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03202nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-51328-7 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801215151.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170103s2017 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319513287 |
-- | 978-3-319-51328-7 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3815 |
100 1# - AUTHOR NAME | |
Author | Lin, Chung-Wei. |
245 10 - TITLE STATEMENT | |
Title | Security-Aware Design for Cyber-Physical Systems |
Sub Title | A Platform-Based Approach / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2017. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | VII, 102 p. 31 illus., 2 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Security Threats in Cyber-Physical Systems -- Security Mechanisms for CAN Protocol -- Security-Aware Mapping for CAN-Based Systems -- Security-Aware Mapping for TDMA-Based Systems -- Security-Aware Design for V2V Communication -- FSM-Based Security-Aware Design -- Graph-Based Security-Aware Design -- Conclusions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. . |
700 1# - AUTHOR 2 | |
Author 2 | Sangiovanni-Vincentelli, Alberto. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-319-51328-7 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2017. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.