- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book systematically addresses the security and resilience of networked agent systems, from sensor networks to general multi-agent systems, against evolving cyber threats.
It explores techniques for distributed security monitoring to detect sparse attacks on sensors (location-fixed/varying and sparse-fixed/varying), Byzantine node/link attacks, and vulnerability-related attacks in heterogeneous sensor networks. It provides advanced solutions for finite/fixed-time monitoring convergence under nonlinear dynamics. Regarding resilient cooperative control of multi-agent systems, the book tackles the challenge of isolation against various attacks, such as false data injection and covert, non-collusive, and collusive attacks. Practical applications range from resilient smart grids and attack-resistant drones to self-healing infrastructures. Rigorous mathematical frameworks, including graph theory and matrix analysis, establish a principled link between theoretical guarantees and the security operations of real-world networked agent systems. These frameworks offer tools to fortify critical networks against unpredictable, unstructured attacks.
This book will appeal to scholars, engineers, and practitioners involved in systems engineering, control theory, cybersecurity, and artificial intelligence.
Contents
1 Introduction 2 Preliminaries 3 Distributed security monitoring of homogeneous sensor networks against sparse sensor attacks 4 Distributed security monitoring of heterogeneous sensor networks against sparse attacks 5 Distributed security monitoring against sparse attacks: From asymptotic to finite-/fixed-time convergence 6 Distributed security monitoring of sensor networks against Byzantine attacks 7 Resilient consensus of integrator-type NASs with switching topologies 8 Distributed resilient cooperative control of high-order NASs based on attack isolation 9 Distributed resilient cooperative control of high-order NASs against collusive attacks 10 Generalized graph-dependent isolation of collusive attacks 11 Resilient consensus of NASs under link attacks