000 04359nam a22006735i 4500
001 978-3-031-16237-4
003 DE-He213
005 20240207153623.0
007 cr nn 008mamaa
008 221123s2023 sz | s |||| 0|eng d
020 _a9783031162374
_9978-3-031-16237-4
050 4 _aTK7895.E42
050 4 _aTK5105.8857
072 7 _aTJF
_2bicssc
072 7 _aGPFC
_2bicssc
072 7 _aTEC007000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aGPFC
_2thema
082 0 4 _a621.38
_223
245 1 0 _aArtificial Intelligence for Cyber-Physical Systems Hardening
_h[electronic resource] /
_cedited by Issa Traore, Isaac Woungang, Sherif Saad.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXIV, 233 p. 66 illus., 49 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aEngineering Cyber-Physical Systems and Critical Infrastructures,
_x2731-5010 ;
_v2
500 _aAcceso multiusuario
505 0 _aIntroduction -- Machine Learning Construction: implications to cybersecurity -- Machine Learning Assessment: implications to cybersecurity -- A Collection of Datasets for Intrusion Detection in MIL-STD-1553 Platforms -- Unsupervised Anomaly Detection for MIL-STD-1553 Avionic Platforms using CUSUM -- Secure Design of Cyber-Physical Systems at the Radio Frequency Level: Machine and Deep Learning-Driven Approaches, Challenges and Opportunities -- Attack Detection by Using Deep Learning for Cyber-Physical System -- Security and privacy of IoT devices for ageing in place -- Detecting Malicious Attacks Using Principal Component Analysis in Medical Cyber-Physical Systems -- Activity and Event Network Graph and Application to Cyberphysical Security.
520 _aThis book presents advances in security assurance for cyber-physical systems (CPS) and report on new machine learning (ML) and artificial intelligence (AI) approaches and technologies developed by the research community and the industry to address the challenges faced by this emerging field. Cyber-physical systems bridge the divide between cyber and physical-mechanical systems by combining seamlessly software systems, sensors, and actuators connected over computer networks. Through these sensors, data about the physical world can be captured and used for smart autonomous decision-making. This book introduces fundamental AI/ML principles and concepts applied in developing secure and trustworthy CPS, disseminates recent research and development efforts in this fascinating area, and presents relevant case studies, examples, and datasets. We believe that it is a valuable reference for students, instructors, researchers, industry practitioners, and related government agencies staff.
541 _fUABC ;
_cPerpetuidad
650 0 _aCooperating objects (Computer systems).
650 0 _aEngineering
_xData processing.
650 0 _aComputational intelligence.
650 0 _aBig data.
650 0 _aArtificial intelligence.
650 1 4 _aCyber-Physical Systems.
650 2 4 _aData Engineering.
650 2 4 _aComputational Intelligence.
650 2 4 _aBig Data.
650 2 4 _aArtificial Intelligence.
700 1 _aTraore, Issa.
_eeditor.
_0(orcid)0000-0003-2987-8047
_1https://orcid.org/0000-0003-2987-8047
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWoungang, Isaac.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSaad, Sherif.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031162367
776 0 8 _iPrinted edition:
_z9783031162381
776 0 8 _iPrinted edition:
_z9783031162398
830 0 _aEngineering Cyber-Physical Systems and Critical Infrastructures,
_x2731-5010 ;
_v2
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-16237-4
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c261928
_d261927