Secure Coordination Control of Networked Robotic Systems (Record no. 87707)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05205nam a22005535i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-99-9359-8 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171629.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240319s2024 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789819993598 |
-- | 978-981-99-9359-8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.30285436 |
100 1# - AUTHOR NAME | |
Author | Li, Xiaolei. |
245 10 - TITLE STATEMENT | |
Title | Secure Coordination Control of Networked Robotic Systems |
Sub Title | From a Control Theory Perspective / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVI, 237 p. 1 illus. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Chapter 1. Introduction -- Chapter 2. Secure Cooperative Control for Networked Robotic Systems Under DoS Attacks -- Chapter 3. Secure Cooperative Control for Networked Robotic Systems with Disturbances and DoS Attacks -- Chapter 4. Secure Tracking for Networked Robotic Systems Under DoS Attacks -- Chapter 5. Jamming-Resilient Coordination of Networked Robotic Systems with Quantized Sampling Data -- Chapter 6. Event-Based Secure Coordination of Networked Robotic Systems Under DoS Attacks -- Chapter 7. Dynamic Event-Based Secure Coordination of Networked Robotic Systems Under DoS Attacks -- Chapter 8. Self-Triggered Secure Coordination of Networked Robotic Systems Under Asynchronous DoS Attacks -- Chapter 9. Secure Coordination of Networked Robotic Systems with Adversarial Nodes -- Chapter 10. Future Research Directions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing, communication, and control, networked robotic systems can perform higher-level tasks by sharing information and working together. It can provide intelligent control and monitoring of a physical process, such as environment observation, information collection, and search and rescue, etc. Thus, coordination control of networked robotic systems has become the focus of scholars worldwide. However, the sensing, communication, and control integration of networked robotic systems make them face unprecedented network security threats, in which cyber attacks have become a major hidden danger to the reliable operation of autonomous unmanned systems. Although existing control methods can achieve swarm collaborative control of networked robotic systems, the protection of which, especially the security of control systems, is rarely addressed. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks. Additionally, several future research directions are provided for networked robotic systems. This book will be an important reference for scientists, engineers, and graduate students from the field of underwater robotic technologies, maritime science, and control engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Wang, Jiange. |
700 1# - AUTHOR 2 | |
Author 2 | Luo, Xiaoyuan. |
700 1# - AUTHOR 2 | |
Author 2 | Guan, Xinping. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-99-9359-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Multiagent systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cooperating objects (Computer systems). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Multiagent Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile and Network Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cyber-Physical Systems. |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.