Cybersecurity of Discrete Event Systems

Cybersecurity of Discrete Event Systems

Author: Rong Su

Publisher: CRC Press

Published: 2024-09-05

Total Pages: 220

ISBN-13: 1040031366

DOWNLOAD EBOOK

This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.


Automated Methods in Cryptographic Fault Analysis

Automated Methods in Cryptographic Fault Analysis

Author: Jakub Breier

Publisher: Springer

Published: 2019-03-19

Total Pages: 342

ISBN-13: 3030113337

DOWNLOAD EBOOK

This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.


Handbook of Big Data Privacy

Handbook of Big Data Privacy

Author: Kim-Kwang Raymond Choo

Publisher: Springer Nature

Published: 2020-03-18

Total Pages: 397

ISBN-13: 3030385574

DOWNLOAD EBOOK

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.


Security, Privacy, and Applied Cryptography Engineering

Security, Privacy, and Applied Cryptography Engineering

Author: Rajat Subhra Chakraborty

Publisher: Springer

Published: 2015-09-24

Total Pages: 390

ISBN-13: 3319241265

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.


Handbook of Research on Intrusion Detection Systems

Handbook of Research on Intrusion Detection Systems

Author: Gupta, Brij B.

Publisher: IGI Global

Published: 2020-02-07

Total Pages: 407

ISBN-13: 1799822435

DOWNLOAD EBOOK

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.


Formal Methods for Industrial Critical Systems

Formal Methods for Industrial Critical Systems

Author: Maurice H. ter Beek

Publisher: Springer Nature

Published: 2020-08-28

Total Pages: 289

ISBN-13: 3030582981

DOWNLOAD EBOOK

This book constitutes the proceedings of the 25th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2020, which was held during September 2-3, 2020. The conference was planned to take place in Vienna, Austria. Due to the COVID-19 pandemic it changed to a virtual event. The 11 full papers presented in this volume were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections as follows: Quantitative Analysis and Cyber-Physical Systems, Formal Verification of Industrial Systems, Temporal Logic and Model Checking. The book also contains a lengthy report on a Formal Methods Survey conducted on occasion of the 25th edition of the conference.


Wide Area Monitoring, Protection and Control Systems

Wide Area Monitoring, Protection and Control Systems

Author: Alfredo Vaccaro

Publisher: IET

Published: 2016-08-04

Total Pages: 200

ISBN-13: 1849198306

DOWNLOAD EBOOK

Wide area monitoring, protection and control systems (WAMPACs) have been recognized as the most promising enabling technologies to meet challenges of modern electric power transmission systems, where reliability, economics, environmental and other social objectives must be balanced to optimize the grid assets and satisfy growing electrical demand. To this aim WAMPAC requires precise phasor and frequency information, which are acquired by deploying multiple time synchronized sensors, known as Phasor Measurement Units (PMUs), providing precise synchronized information about voltage and current phasors, frequency and rate-of-change-of-frequency.


Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering

Author: John M. Borky

Publisher: Springer

Published: 2018-09-08

Total Pages: 788

ISBN-13: 3319956698

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.


Cyber-Physical Systems Security

Cyber-Physical Systems Security

Author: Çetin Kaya Koç

Publisher: Springer

Published: 2018-12-06

Total Pages: 347

ISBN-13: 3319989359

DOWNLOAD EBOOK

The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.


Economic Model Predictive Control

Economic Model Predictive Control

Author: Helen Durand

Publisher: Foundations and Trends (R) in Systems and Control

Published: 2018-06-19

Total Pages: 68

ISBN-13: 9781680834321

DOWNLOAD EBOOK

Economic Model Predictive Control (EMPC) is a control strategy that moves process operation away from the steady-state paradigm toward a potentially time-varying operating strategy to improve process profitability. The EMPC literature is replete with evidence that this new paradigm may enhance process profits when a model of the chemical process provides a sufficiently accurate representation of the process dynamics. Systems using EMPC often neglect the dynamics associated with equipment and are often neglected when modeling a chemical process. Recent studies have shown they can significantly impact the effectiveness of an EMPC system. Concentrating on valve behavior in a chemical process, this monograph develops insights into the manner in which equipment behavior should impact the design process for EMPC and to provide a perspective on a number of open research topics in this direction. Written in tutorial style, this monograph provides the reader with a full literature review of the topic and demonstrates how these techniques can be adopted in a practical system.