Cyber-physical systems security. ([2018])
- Record Type:
- Book
- Title:
- Cyber-physical systems security. ([2018])
- Main Title:
- Cyber-physical systems security
- Further Information:
- Note: Çetin Kaya Koç, editor.
- Editors:
- Koç, Çetin K, 1957-
- Contents:
- Intro; Preface; Contents; Contributors; Robust Digital Computation in the Physical World; 1 Introduction; 2 Limitations of Digital Models in an Analog World; 2.1 Introduction; 2.2 Physics of Hybrid Modeling; 2.3 Definition of the Thermostat Model; 2.4 Informal Analysis of the Thermostat Model; 2.5 Formal Implementation; 3 Modeling and Verification of Out-of-Nominal Logic; 3.1 Introduction; 3.2 Modeling Out-of-Nominal Safety Properties; 3.3 Example Turnstile Model; 3.4 Design and Out-of-Nominal Verification Via Abstraction; 3.4.1 Refinement (High Level); 3.4.2 Implementation (Low Level) 4 Resilience of Computational Physics Simulation4.1 Introduction; 4.2 Methodology; 4.2.1 Operations in PDE Solvers; 4.2.2 Error Model and Mitigation Approach; 4.3 Application to the Conjugate Gradient Solver; 4.3.1 The Basic Conjugate Gradient Solver; 4.3.2 Controlling Convergence of the CG Algorithm; 4.3.3 Evaluation Using In Situ Interpolation; 5 Conclusion; References; Constraint-Based Framework for Reasoning with DifferentialEquations; 1 Introduction; 2 Preliminary Notions; 2.1 Numerical Constraint Satisfaction Problems; 2.2 Branch-and-Contract Solving Method; 2.3 Some Limitations on NCSP 2.3.1 Equality Constraints2.3.2 Differential Constraints; 3 Set-Based Constraint Satisfaction Differential Problems; 3.1 Dynamical Systems; 3.2 Set-Based Constraints; 3.3 Set-Based Differential Constraint Satisfaction Problems; 4 Solving SCSDP; 4.1 Interval-Based Constraints; 4.2 Interval-BasedIntro; Preface; Contents; Contributors; Robust Digital Computation in the Physical World; 1 Introduction; 2 Limitations of Digital Models in an Analog World; 2.1 Introduction; 2.2 Physics of Hybrid Modeling; 2.3 Definition of the Thermostat Model; 2.4 Informal Analysis of the Thermostat Model; 2.5 Formal Implementation; 3 Modeling and Verification of Out-of-Nominal Logic; 3.1 Introduction; 3.2 Modeling Out-of-Nominal Safety Properties; 3.3 Example Turnstile Model; 3.4 Design and Out-of-Nominal Verification Via Abstraction; 3.4.1 Refinement (High Level); 3.4.2 Implementation (Low Level) 4 Resilience of Computational Physics Simulation4.1 Introduction; 4.2 Methodology; 4.2.1 Operations in PDE Solvers; 4.2.2 Error Model and Mitigation Approach; 4.3 Application to the Conjugate Gradient Solver; 4.3.1 The Basic Conjugate Gradient Solver; 4.3.2 Controlling Convergence of the CG Algorithm; 4.3.3 Evaluation Using In Situ Interpolation; 5 Conclusion; References; Constraint-Based Framework for Reasoning with DifferentialEquations; 1 Introduction; 2 Preliminary Notions; 2.1 Numerical Constraint Satisfaction Problems; 2.2 Branch-and-Contract Solving Method; 2.3 Some Limitations on NCSP 2.3.1 Equality Constraints2.3.2 Differential Constraints; 3 Set-Based Constraint Satisfaction Differential Problems; 3.1 Dynamical Systems; 3.2 Set-Based Constraints; 3.3 Set-Based Differential Constraint Satisfaction Problems; 4 Solving SCSDP; 4.1 Interval-Based Constraints; 4.2 Interval-Based Differential Constraints; 4.2.1 Outer Approximation of Differential Constraints; 4.2.2 Inner Approximation of Differential Constraints; 4.3 Revisiting Branch-and-Contract Solving Method; 4.3.1 Contraction; 4.3.2 Propagation; 5 Numerical Example; 6 Conclusion; References Approximate Computing and Its Application to Hardware Security1 Introduction; 2 Approximate Circuit; 2.1 Approximate Adders; 2.2 Approximate Multipliers; 2.3 Approximate Dividers; 3 Approximate Software/Algorithm; 4 Approximate Computing for Hardware Security; 4.1 Security Primitives Based on Approximate Computing; 4.1.1 Floating-Point Format with Embedding Security; 4.1.2 Approximate Computing with Embedded Security Information; 4.2 A Low-Voltage Approximate Computing Adder for Authentication; 5 Future Research Directions; 5.1 PUFs and SCAs; 5.2 SCAs; 5.3 Hardware Trojans (HTs) 5.4 Approximate Arithmetic Circuit for Logic Obfuscation6 Conclusion; References; Mathematical Optimizations for Deep Learning; 1 Introduction; 2 Pruning; 3 Quantization; 3.1 Binary Weights; 3.2 Binary Weights and Activations; 4 Weight Sharing and Compression; 4.1 Weight Sharing; 4.2 Compression; 5 Model Distillation; 6 Filter Decomposition; 7 Conclusion; References; A Zero-Entry Cyber Range Environment for Future Learning Ecosystems; 1 Introduction; 2 Limitations of Current Practice; 2.1 Specific Problem Being Solved; 3 Research; 3.1 Research Question; 3.2 Learning Science Approach The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 006.2/2
Cooperating objects (Computer systems) -- Security measures
Electronic books - Languages:
- English
- ISBNs:
- 9783319989358
3319989359 - Related ISBNs:
- 9783319989341
3319989340 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.380786
- Ingest File:
- 02_369.xml