Listing 1 - 3 of 3 |
Sort by
|
Choose an application
The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared.
Robust control --- Automatic control --- Computer security. --- Computer viruses --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Control engineering --- Control equipment --- Control theory --- Engineering instruments --- Automation --- Programmable controllers --- Robustness (Control systems) --- Security measures. --- Prevention. --- Protection --- Security measures --- IT security --- industrial automation and control --- Stuxnet --- control system networks --- cyber fragility --- cyber robustness --- robustification
Choose an application
High technology industries are in desperate need for adequate tools to assess the validity of simulations produced by ever faster computers for perennial unstable problems. In order to meet these industrial expectations, applied mathematicians are facing a formidable challenge summarized by these words - nonlinearity and coupling. This book is unique as it proposes truly original solutions: (1) Using hypercomputation in quadratic algebras, as opposed to the traditional use of linear vector spaces in the 20th century; (2) complementing the classical linear logic by the complex logic which
Social sciences --- Qualitative research --- Qualitative analysis (Research) --- Qualitative methods (Research) --- Research --- Data processing. --- Coupled problems (Complex systems) --- Mathematical optimization --- Nonlinear theories --- 519.61 --- 681.3*G4 --- Nonlinear problems --- Nonlinearity (Mathematics) --- Calculus --- Mathematical analysis --- Mathematical physics --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Maxima and minima --- Operations research --- Simulation methods --- System analysis --- 681.3*G4 Mathematical software: algorithm analysis; certification and testing; efficiency; portability; reliability and robustness; verification --- Mathematical software: algorithm analysis; certification and testing; efficiency; portability; reliability and robustness; verification --- 519.61 Numerical methods of algebra --- Numerical methods of algebra --- Coupled field problems (Complex systems) --- Problems, Coupled (Complex systems) --- Dynamics
Choose an application
This volume brings together the collected contributions on the theme of robust mechanism design and robust implementation that Dirk Bergemann and Stephen Morris have been working on for the past decade. The collection is preceded by a comprehensive introductory essay, specifically written for this volume with the aim of providing the readers with an overview of the research agenda pursued in the collected papers. The introduction selectively presents the main results of the papers, and attempts to illustrate many of them in terms of a common and canonical example, namely a single unit auction
Robust control --- Prices --- Prices. --- Robust control. --- Mechanical Engineering --- Engineering & Applied Sciences --- Mechanical Engineering - General --- Commercial products --- Commodity prices --- Justum pretium --- Price theory --- Robustness (Control systems) --- Consumption (Economics) --- Cost --- Costs, Industrial --- Money --- Cost and standard of living --- Supply and demand --- Value --- Wages --- Willingness to pay --- Automatic control --- E-books
Listing 1 - 3 of 3 |
Sort by
|