000 | 03202nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-51328-7 | ||
003 | DE-He213 | ||
005 | 20220801215151.0 | ||
007 | cr nn 008mamaa | ||
008 | 170103s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319513287 _9978-3-319-51328-7 |
||
024 | 7 |
_a10.1007/978-3-319-51328-7 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aLin, Chung-Wei. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _942730 |
|
245 | 1 | 0 |
_aSecurity-Aware Design for Cyber-Physical Systems _h[electronic resource] : _bA Platform-Based Approach / _cby Chung-Wei Lin, Alberto Sangiovanni-Vincentelli. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aVII, 102 p. 31 illus., 2 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Security Threats in Cyber-Physical Systems -- Security Mechanisms for CAN Protocol -- Security-Aware Mapping for CAN-Based Systems -- Security-Aware Mapping for TDMA-Based Systems -- Security-Aware Design for V2V Communication -- FSM-Based Security-Aware Design -- Graph-Based Security-Aware Design -- Conclusions. | |
520 | _aAddressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. . | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _942731 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _942732 |
700 | 1 |
_aSangiovanni-Vincentelli, Alberto. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _942733 |
|
710 | 2 |
_aSpringerLink (Online service) _942734 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319513270 |
776 | 0 | 8 |
_iPrinted edition: _z9783319513294 |
776 | 0 | 8 |
_iPrinted edition: _z9783319846217 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-51328-7 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c77180 _d77180 |