Networked predictive control of systems with communication constraints and cyber attacks:
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Singapore
Springer
[2019]
|
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 https://doi.org/10.1007/978-981-13-0520-7 |
Umfang: | 1 Online-Ressource (xx, 219 Seiten) Illustrationen, Diagramme |
ISBN: | 9789811305207 |
DOI: | 10.1007/978-981-13-0520-7 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV045269913 | ||
003 | DE-604 | ||
005 | 20190906 | ||
007 | cr|uuu---uuuuu | ||
008 | 181105s2019 xx a||| o|||| 00||| eng d | ||
020 | |a 9789811305207 |c Online |9 978-981-13-0520-7 | ||
024 | 7 | |a 10.1007/978-981-13-0520-7 |2 doi | |
035 | |a (ZDB-2-INR)9789811305207 | ||
035 | |a (OCoLC)1061556008 | ||
035 | |a (DE-599)BVBBV045269913 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-898 |a DE-91 |a DE-634 |a DE-706 |a DE-859 |a DE-522 |a DE-Aug4 |a DE-860 |a DE-862 |a DE-863 |a DE-703 |a DE-92 |a DE-573 | ||
082 | 0 | |a 629.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Pang, Zhong-Hua |e Verfasser |4 aut | |
245 | 1 | 0 | |a Networked predictive control of systems with communication constraints and cyber attacks |c Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
264 | 1 | |a Singapore |b Springer |c [2019] | |
300 | |a 1 Online-Ressource (xx, 219 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Control | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Security | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Data protection | |
700 | 1 | |a Liu, Guo-Ping |e Verfasser |4 aut | |
700 | 1 | |a Zhou, Donghua |e Verfasser |4 aut | |
700 | 1 | |a Sun, Dehui |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-13-0519-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-130-521-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-13-0520-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-INR | ||
940 | 1 | |q ZDB-2-INR_2019 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030657697 | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-522 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-634 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-Aug4 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-573 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-92 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-898 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-859 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-860 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-863 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-862 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-91 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-703 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-706 |p ZDB-2-INR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-0520-7 |l DE-739 |p ZDB-2-INR |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2408500 |
---|---|
_version_ | 1821935947441242113 |
any_adam_object | |
author | Pang, Zhong-Hua Liu, Guo-Ping Zhou, Donghua Sun, Dehui |
author_facet | Pang, Zhong-Hua Liu, Guo-Ping Zhou, Donghua Sun, Dehui |
author_role | aut aut aut aut |
author_sort | Pang, Zhong-Hua |
author_variant | z h p zhp g p l gpl d z dz d s ds |
building | Verbundindex |
bvnumber | BV045269913 |
classification_rvk | ST 200 |
classification_tum | DAT 000 |
collection | ZDB-2-INR |
ctrlnum | (ZDB-2-INR)9789811305207 (OCoLC)1061556008 (DE-599)BVBBV045269913 |
dewey-full | 629.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 629 - Other branches of engineering |
dewey-raw | 629.8 |
dewey-search | 629.8 |
dewey-sort | 3629.8 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik / Mechatronik |
doi_str_mv | 10.1007/978-981-13-0520-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03205nam a2200661zc 4500</leader><controlfield tag="001">BV045269913</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190906 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181105s2019 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811305207</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-13-0520-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-13-0520-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-INR)9789811305207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1061556008</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045269913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">629.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pang, Zhong-Hua</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Networked predictive control of systems with communication constraints and cyber attacks</subfield><subfield code="c">Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 219 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Guo-Ping</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Donghua</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Dehui</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-13-0519-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-130-521-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-INR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-INR_2019</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030657697</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-0520-7</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045269913 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:22:37Z |
institution | BVB |
isbn | 9789811305207 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030657697 |
oclc_num | 1061556008 |
open_access_boolean | |
owner | DE-739 DE-898 DE-BY-UBR DE-91 DE-BY-TUM DE-634 DE-706 DE-859 DE-522 DE-Aug4 DE-860 DE-862 DE-BY-FWS DE-863 DE-BY-FWS DE-703 DE-92 DE-573 |
owner_facet | DE-739 DE-898 DE-BY-UBR DE-91 DE-BY-TUM DE-634 DE-706 DE-859 DE-522 DE-Aug4 DE-860 DE-862 DE-BY-FWS DE-863 DE-BY-FWS DE-703 DE-92 DE-573 |
physical | 1 Online-Ressource (xx, 219 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-INR ZDB-2-INR_2019 |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
spellingShingle | Pang, Zhong-Hua Liu, Guo-Ping Zhou, Donghua Sun, Dehui Networked predictive control of systems with communication constraints and cyber attacks Control Computer Systems Organization and Communication Networks Communications Engineering, Networks Security Computer network architectures Telecommunication Data protection |
title | Networked predictive control of systems with communication constraints and cyber attacks |
title_auth | Networked predictive control of systems with communication constraints and cyber attacks |
title_exact_search | Networked predictive control of systems with communication constraints and cyber attacks |
title_full | Networked predictive control of systems with communication constraints and cyber attacks Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
title_fullStr | Networked predictive control of systems with communication constraints and cyber attacks Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
title_full_unstemmed | Networked predictive control of systems with communication constraints and cyber attacks Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
title_short | Networked predictive control of systems with communication constraints and cyber attacks |
title_sort | networked predictive control of systems with communication constraints and cyber attacks |
topic | Control Computer Systems Organization and Communication Networks Communications Engineering, Networks Security Computer network architectures Telecommunication Data protection |
topic_facet | Control Computer Systems Organization and Communication Networks Communications Engineering, Networks Security Computer network architectures Telecommunication Data protection |
url | https://doi.org/10.1007/978-981-13-0520-7 |
work_keys_str_mv | AT pangzhonghua networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks AT liuguoping networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks AT zhoudonghua networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks AT sundehui networkedpredictivecontrolofsystemswithcommunicationconstraintsandcyberattacks |