Skip to Content
Security and Privacy in Cyber-Physical Systems
book

Security and Privacy in Cyber-Physical Systems

by Houbing Herbert Song, Glenn A. Fink, Sabina Jeschke
November 2017
Intermediate to advanced
472 pages
17h 52m
English
Wiley-IEEE Press
Content preview from Security and Privacy in Cyber-Physical Systems

Index

  1.  
  2. a
  3. access control systems
  4. access threats
  5. admission control approach
    1. brutal admission control
    2. consumer's satisfaction
    3. demand-side management
    4. fair priority-based admission control
    5. GridLAB-D and GridMat simulation tools
    6. load admission control
    7. load shedding mechanisms
    8. load-size-based admission control
    9. normal operation
    10. PHEV charging
    11. priority-based admission control
    12. priority-based load protection and control scheme
    13. proposed approach
    14. simulation scenarios
    15. utility-side load management
    16. wide area information (WAI)-based control scheme
    17. wide area measurement (WAM)
  6. Advanced Encryption Standard (AES)
  7. advanced metering infrastructure (AMI)
  8. Alarm-Net
  9. anomaly detection
  10. anonymity
  11. anonymized authentication
  12. arranger robot
  13. artificial neural network (ANN)
  14. assistant robots
  15. attack strategies
  16. attribute-based access control (ABAC) model
  17. attribute-based encryption (ABE)
  18. authentication
  19. automatic repeat request
  20.  
  21. b
  22. biometric solutions
  23. BLE. Bluetooth
  24. block chain
  25. Bluetooth
  26. body area network (BAN)
  27. body area network authentication (BANA) scheme
  28. bolus-enabled temperature sensing
  29. bootstrapping
  30. Building Automation and Control Networks (BACnet)
  31. building automation systems (BAS)
  32. Byzantine attack
  33.  
  34. c
  35. CapBAC model
  36. certificate revocation lists (CRLs)
  37. certification authority (CA)
  38. ciphertext
  39. ciphertext (encrypted) character
  40. ciphertext-policy attribute-based encryption scheme
  41. city-based cloud
  42. cloud-based robotic networks
    1. ad hoc network
    2. attribute-based encryption
    3. communication security
    4. as a community
    5. doctrine ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho

Publisher Resources

ISBN: 9781119226048