Buch, Englisch, Band 2, 233 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 541 g
Reihe: Engineering Cyber-Physical Systems and Critical Infrastructures
Buch, Englisch, Band 2, 233 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 541 g
Reihe: Engineering Cyber-Physical Systems and Critical Infrastructures
ISBN: 978-3-031-16236-7
Verlag: Springer International Publishing
This book introduces fundamental AI/ML principles and concepts applied in developing secure and trustworthy CPS, disseminates recent research and development efforts in this fascinating area, and presents relevant case studies, examples, and datasets. We believe that it is a valuable reference for students, instructors, researchers, industry practitioners, and related government agencies staff.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Technik Allgemein Computeranwendungen in der Technik
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Big Data
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Wissenschaft & Technologie
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
Weitere Infos & Material
Introduction.- Machine Learning Construction: implications to cybersecurity.- Machine Learning Assessment: implications to cybersecurity.- A Collection of Datasets for Intrusion Detection in MIL-STD-1553 Platforms.- Unsupervised Anomaly Detection for MIL-STD-1553 Avionic Platforms using CUSUM.- Secure Design of Cyber-Physical Systems at the Radio Frequency Level: Machine and Deep Learning-Driven Approaches, Challenges and Opportunities.- Attack Detection by Using Deep Learning for Cyber-Physical System.- Security and privacy of IoT devices for ageing in place.- Detecting Malicious Attacks Using Principal Component Analysis in Medical Cyber-Physical Systems.- Activity and Event Network Graph and Application to Cyberphysical Security.