scispace - formally typeset
Search or ask a question

Showing papers on "Cyber-physical system published in 2014"


Journal ArticleDOI
TL;DR: A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Abstract: The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. We give a new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair $(A,C)$ of the system and we show in particular that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked. In addition, we show how the design of a secure local control loop can improve the resilience of the system. When the number of attacks is smaller than a threshold, we propose an efficient algorithm inspired from techniques in compressed sensing to estimate the state of the plant despite attacks. We give a theoretical characterization of the performance of this algorithm and we show on numerical simulations that the method is promising and allows to reconstruct the state accurately despite attacks. Finally, we consider the problem of designing output-feedback controllers that stabilize the system despite sensor attacks. We show that a principle of separation between estimation and control holds and that the design of resilient output feedback controllers can be reduced to the design of resilient state estimators.

1,199 citations


Journal ArticleDOI
TL;DR: There are significant roots generally and particularly in the CIRP community -which point towards CPPSs, and Expectations and the related new R&D challenges will be outlined.

971 citations


Proceedings ArticleDOI
22 May 2014
TL;DR: This paper presents a prototypical application that demonstrates the essential aspects of Industry 4.0 and simultaneously shows characteristics that represent the challenges regarding the development of cyber-physical systems, reliability, security and data protection.
Abstract: We are currently experiencing the fourth Industrial Revolution in terms of cyber physical systems. These systems are industrial automation systems that enable many innovative functionalities through their networking and their access to the cyber world, thus changing our everyday lives significantly. In this context, new business models, work processes and development methods that are currently unimaginable will arise. These changes will also strongly influence the society and people. Family life, globalization, markets, etc. will have to be redefined. However, the Industry 4.0 simultaneously shows characteristics that represent the challenges regarding the development of cyber-physical systems, reliability, security and data protection. Following a brief introduction to Industry 4.0, this paper presents a prototypical application that demonstrates the essential aspects.

632 citations


Journal ArticleDOI
TL;DR: The approach is to classify modern CPS Intrusion Detection System techniques based on two design dimensions: detection technique and audit material, and provides insight on the effectiveness of IDS techniques as they apply to CPSs.
Abstract: Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As this integration deepens, the importance of securing these systems increases. In order to identify gaps and propose research directions in CPS intrusion detection research, we survey the literature of this area. Our approach is to classify modern CPS Intrusion Detection System (IDS) techniques based on two design dimensions: detection technique and audit material. We summarize advantages and drawbacks of each dimension’s options. We also summarize the most and least studied CPS IDS techniques in the literature and provide insight on the effectiveness of IDS techniques as they apply to CPSs. Finally, we identify gaps in CPS IDS research and suggest future research areas.

593 citations


BookDOI
12 Nov 2014
TL;DR: The second edition of Modelica features improvements and updates of the Modelica language including synchronous clocked constructs, and examines basic concepts of cyber-physical, equation-based, object-oriented sy ...
Abstract: The second edition features improvements and updates of the Modelica language including synchronous clocked constructs, examines basic concepts of cyber-physical, equation-based, object-oriented sy ...

343 citations


Journal ArticleDOI
TL;DR: This article proposes a multi-layered context-aware architecture and introduces two crucial service components, vehicular social networks and context- aware vehicular security, and proposes an application scenario regarding the context- Aware dynamic parking services by illuminating the cloud-assisted architecture and logic flow.
Abstract: The advances in wireless communication techniques, mobile cloud computing, and context- aware technologies boost a growing interest in the design, development, and deployment of vehicular networks for emerging applications. This leads to an increasing evolutionary tendency to change from vehicular networks toward cloud-assisted context-aware vehicular cyberphysical systems. In this article, we first propose a multi-layered context-aware architecture and introduce two crucial service components, vehicular social networks and context-aware vehicular security. Then we propose an application scenario regarding the context-aware dynamic parking services by illuminating the cloud-assisted architecture and logic flow. Finally, we investigate the challenges and possible solutions, including context-aware safety hazard prediction, context-aware dynamic vehicle routing, and context-aware vehicular clouds.

340 citations


Ovidiu Vermesan1, Peter Friess1
30 Jun 2014
TL;DR: Internet of Things is creating a revolutionary new paradigm, with opportunities in every industry from Health Care, Pharmaceuticals, Food and Beverage, Agriculture, Computer, Electronics Telecommunications, Automotive, Aeronautics, Transportation Energy and Retail to apply the massive potential of the IoT to achieving real-world solutions.
Abstract: Internet of Things is creating a revolutionary new paradigm, with opportunities in every industry from Health Care, Pharmaceuticals, Food and Beverage, Agriculture, Computer, Electronics Telecommunications, Automotive, Aeronautics, Transportation Energy and Retail to apply the massive potential of the IoT to achieving real-world solutions. The beneficiaries will include as well semiconductor companies, device and product companies, infrastructure software companies, application software companies, consulting companies, telecommunication and cloud service providers. IoT will create new revenues annually for these stakeholders, and potentially create substantial market share shakeups due to increased technology competition.

288 citations


Journal ArticleDOI
TL;DR: An extensive set of technical challenges are enumerated and specific applications are used to elaborate and provide insight into each specific concept in the Cyber-Physical System.
Abstract: The Cyber-Physical System (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered system that integrates embedded computing technologies (cyber part) into the physical world. In order to define and understand CPS more precisely, this article presents a detailed survey of the related work, discussing the origin of CPS, the relations to other research fields, prevalent concepts, and practical applications. Further, this article enumerates an extensive set of technical challenges and uses specific applications to elaborate and provide insight into each specific concept. CPS is a very broad research area and therefore has diverse applications spanning different scales. Additionally, the next generation technologies are expected to play an important role on CPS research. All of CPS applications need to be designed considering the cutting-edge technologies, necessary system-level requirements, and overall impact on the real world.

263 citations


BookDOI
20 May 2014
TL;DR: This book presents cutting-edge emerging technologies and approaches in the areas of service-oriented architectures, intelligent devices and cloud-based cyber-physical systems and also depicts technologies and architectures as well as a migration approach and engineering tools based on these.
Abstract: This book presents cutting-edge emerging technologies and approaches in the areas of service-oriented architectures, intelligent devices and cloud-based cyber-physical systems. It provides a clear view on their applicability to the management and automation of manufacturing and process industries. It offers a holistic view of future industrial cyber-physical systems and their industrial usage and also depicts technologies and architectures as well as a migration approach and engineering tools based on these. By providing a careful balance between the theory and the practical aspects, this book has been authored by several experts from academia and industry, thereby offering a valuable understanding of the vision, the domain, the processes and the results of the research. It has several illustrations and tables to clearly exemplify the concepts and results examined in the text and these are supported by four real-life case-studies. We are witnessing rapid advances in the industrial automation, mainly driven by business needs towards agility and supported by new disruptive advances both on the software and hardware side, as well as the cross-fertilization of concepts and the amalgamation of information and communication technology-driven approaches in traditional industrial automation and control systems. This book is intended for technology managers, application designers, solution developers, engineers working in industry, as well as researchers, undergraduate and graduate students of industrial automation, industrial informatics and production engineering.

248 citations


Journal ArticleDOI
TL;DR: A survey of CPS in healthcare applications that have been proposed to date by academia as well as industry is presented and a comprehensive taxonomy is provided that characterizes and classifies different components and methods that are required for the application of CPS for healthcare.
Abstract: Cyber-physical system (CPS) is an integration of physical processes with computation and communication. It has the ability to add more intelligence to social life. Wireless sensor networks (WSN) can be a vital part of CPS as strong sensing capability is one of the major driving factors for CPS applications. CPS is still considered to be a nascent technology, and there are many challenges yet to be addressed. A few CPS applications in healthcare have been proposed to date, and they lack the flexibility of technology integration, such as integration of computing resources with sensor networks. This paper presents a survey of CPS in healthcare applications that have been proposed to date by academia as well as industry. A comprehensive taxonomy is also provided that characterizes and classifies different components and methods that are required for the application of CPS in healthcare. The taxonomy not only highlights the similarities and differences of the state-of-the-art technologies utilized in CPS for healthcare from the perspective of WSN and Cloud Computing but also identifies the areas that require further research. It is expected that this taxonomy and its mapping to relevant systems will be highly useful for further development of CPS for healthcare.

208 citations


Journal ArticleDOI
TL;DR: The security issues and challenges on the IoT-based SG are investigated, and the major security services that should be considered when dealing with SG security are defined.

Journal ArticleDOI
TL;DR: This paper explores CPS beyond M2M concept and looks at futuristic applications, and the main paradigm shift is to design localized algorithms, where CPS nodes make decisions based on local knowledge.
Abstract: Machine-to-Machine (M2M) paradigm enables machines (sensors, actuators, robots, and smart meter readers) to communicate with each other with little or no human intervention. M2M is a key enabling technology for the cyber-physical systems (CPSs). This paper explores CPS beyond M2M concept and looks at futuristic applications. Our vision is CPS with distributed actuation and in-network processing. We describe few particular use cases that motivate the development of the M2M communication primitives tailored to large-scale CPS. M2M communications in literature were considered in limited extent so far. The existing work is based on small-scale M2M models and centralized solutions. Different sources discuss different primitives. Few existing decentralized solutions do not scale well. There is a need to design M2M communication primitives that will scale to thousands and trillions of M2M devices, without sacrificing solution quality. The main paradigm shift is to design localized algorithms, where CPS nodes make decisions based on local knowledge. Localized coordination and communication in networked robotics, for matching events and robots, were studied to illustrate new directions.

Journal ArticleDOI
TL;DR: This paper proposes a cyber-physical codesign approach to structural health monitoring based on wireless sensor networks that closely integrates flexibility- based damage localization methods that allow a tradeoff between the number of sensors and the resolution of damage localization, and an energy-efficient, multilevel computing architecture specifically designed to leverage the multiresolution feature of the flexibility-based approach.
Abstract: Our deteriorating civil infrastructure faces the critical challenge of long-term structural health monitoring for damage detection and localization. In contrast to existing research that often separates the designs of wireless sensor networks and structural engineering algorithms, this paper proposes a cyber-physical codesign approach to structural health monitoring based on wireless sensor networks. Our approach closely integrates 1) flexibility-based damage localization methods that allow a tradeoff between the number of sensors and the resolution of damage localization, and 2) an energy-efficient, multilevel computing architecture specifically designed to leverage the multiresolution feature of the flexibility-based approach. The proposed approach has been implemented on the Intel Imote2 platform. Experiments on a simulated truss structure and a real full-scale truss structure demonstrate the system's efficacy in damage localization and energy efficiency.

Journal ArticleDOI
01 Jul 2014
TL;DR: The technological scenario of M2M communications consisting of wireless infrastructure to cloud, and machine swarm of tremendous devices is presented to complete fundamental understanding and engineering knowledge of this new communication and networking technology front.
Abstract: Machine-to-machine (M2M) communications emerge to autonomously operate to link interactions between Internet cyber world and physical systems. We present the technological scenario of M2M communications consisting of wireless infrastructure to cloud, and machine swarm of tremendous devices. Related technologies toward practical realization are explored to complete fundamental understanding and engineering knowledge of this new communication and networking technology front.

Journal ArticleDOI
TL;DR: A platform-based methodology is proposed, which enables independent implementation of system topology and control protocol by using a compositional approach and is shown to be effective on a proof-of-concept electric power system design.
Abstract: In an aircraft electric power system, one or more supervisory control units actuate a set of electromechanical switches to dynamically distribute power from generators to loads, while satisfying safety, reliability, and real-time performance requirements. To reduce expensive redesign steps, this control problem is generally addressed by minor incremental changes on top of consolidated solutions. A more systematic approach is hindered by a lack of rigorous design methodologies that allow estimating the impact of earlier design decisions on the final implementation. To achieve an optimal implementation that satisfies a set of requirements, we propose a platform-based methodology for electric power system design, which enables independent implementation of system topology (i.e., interconnection among elements) and control protocol by using a compositional approach. In our flow, design space exploration is carried out as a sequence of refinement steps from the initial specification toward a final implementation by mapping higher level behavioral and performance models into a set of either existing or virtual library components at the lower level of abstraction. Specifications are first expressed using the formalisms of linear temporal logic, signal temporal logic, and arithmetic constraints on Boolean variables. To reason about different requirements, we use specialized analysis and synthesis frameworks and formulate assume guarantee contracts at the articulation points in the design flow. We show the effectiveness of our approach on a proof-of-concept electric power system design.

Journal ArticleDOI
TL;DR: A VCPS and MCC Integration Architecture (VCMIA) is designed, which provides mobile services for potential users such as drivers and passengers to access mobile traffic cloud and can provide the flexibility for enabling diverse applications.
Abstract: The advances in wireless communication technologies, vehicular networks and cloud computing boost a growing interest in the design, development and deployment of Vehicular Cyber-Physical Systems (VCPS) for some emerging applications, which leads to an increasing demand on connecting Mobile Cloud Computing (MCC) users to VCPS for accessing the richer applications and services. In this paper, we first identify the key requirements of designing an efficient and flexible architecture for integrating MCC and VCPS. Based on the requirements, we design a VCPS and MCC Integration Architecture (VCMIA), which provides mobile services for potential users such as drivers and passengers to access mobile traffic cloud. Then, we ana- lyze two crucial cloud-supported components: GIS with traffic-aware capability and cloud-supported dynamic vehicle routing. Finally, we select Vehicle Maintenance Services (VMS) as an application scenario to carry out the validation. The proposed VCMIA can provide the flexibility for enabling diverse applications.

Journal ArticleDOI
TL;DR: In this paper, a case study of a cyber-attack on a small-scale manufacturing system is presented to illustrate the ease of implementing attacks, highlight their drastic effects and demonstrate the need for educating the current and future manufacturing workforce.
Abstract: As technology progresses, cyber-physical systems are becoming susceptible to a wider range of attacks. In manufacturing, these attacks pose a significant threat to ensuring products conform to their original design intent and to maintaining the safety of equipment, employees, and consumers. This letter discusses the importance of research and development of cyber-security tools specifically designed for manufacturing. A case study of a cyber-attack on a small-scale manufacturing system is presented to (i) illustrate the ease of implementing attacks, (ii) highlight their drastic effects and (iii) demonstrate the need for educating the current and future manufacturing workforce.

Journal ArticleDOI
TL;DR: The design outline of the intrusion detection mechanism in CPS is introduced in terms of the layers of system and specific detection techniques, and some significant research problems are identified for enlightening the subsequent studies.
Abstract: Cyber-physical systems (CPSs) integrate the computation with physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. CPS was identified as one of the eight research priority areas in the August 2007 report of the President's Council of Advisors on Science and Technology, as CPS will be the core component of many critical infrastructures and industrial control systems in the near future. However, a variety of random failures and cyber attacks exist in CPS, which greatly restrict their growth. Fortunately, an intrusion detection mechanism could take effect for protecting CPS. When a misbehavior is found by the intrusion detector, the appropriate action can be taken immediately so that any harm to the system will be minimized. As CPSs are yet to be defined universally, the application of the instruction detection mechanism remain open presently. As a result, the effort will be made to discuss how to appropriately apply the intrusion detection mechanism to CPS in this paper. By examining the unique properties of CPS, it intends to define the specific requirements first. Then, the design outline of the intrusion detection mechanism in CPS is introduced in terms of the layers of system and specific detection techniques. Finally, some significant research problems are identified for enlightening the subsequent studies.

Posted Content
TL;DR: A novel algorithm is presented that uses a satisfiability modulo theory approach to harness the complexity of secure state estimation and leverages results from formal methods over real numbers to provide guarantees on the soundness and completeness of the algorithm.
Abstract: We address the problem of detecting and mitigating the effect of malicious attacks to the sensors of a linear dynamical system. We develop a novel, efficient algorithm that uses a Satisfiability-Modulo-Theory approach to isolate the compromised sensors and estimate the system state despite the presence of the attack, thus harnessing the intrinsic combinatorial complexity of the problem. By leveraging results from formal methods over real numbers, we provide guarantees on the soundness and completeness of our algorithm. We then report simulation results to compare its runtime performance with alternative techniques. Finally, we demonstrate its application to the problem of controlling an unmanned ground vehicle.


Journal ArticleDOI
TL;DR: In this paper, the authors present an integrated software package for the cyber-physical simulation of DMS taking into account the accuracy of state estimation and measurements, and the results proved the need of cosimulation packages in modern distribution systems.
Abstract: Energy management systems for the operation of distributed energy resources, distribution storage devices, and responsive loads will be embedded in distribution management systems (DMSs) as advanced functions that rely on accurate input data and fast communication signals. For a proper DMS design, the impact of the state estimation uncertainties and of the communication system delays should be evaluated. The paper presents an integrated software package for the cyber-physical simulation of DMS taking into account the accuracy of state estimation and measurements. The effectiveness of a wireless Wi-Max communication system has been tested on the rural Italian representative network produced by the research project ATLANTIDE. Results proved the need of cosimulation packages in modern distribution systems.

Journal ArticleDOI
TL;DR: Cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) is discussed from a coordinated cyber attack perspective and a game-theoretic approach to address the issue is introduced.

Journal ArticleDOI
TL;DR: SOCCA is introduced, a cyber-physical security evaluation technique to plan not only for accidental contingencies but also for malicious compromises, a new unified formalism to model the cyber- physical system including interconnections among cyber and physical components.
Abstract: Contingency analysis is a critical activity in the context of the power infrastructure because it provides a guide for resiliency and enables the grid to continue operating even in the case of failure. In this paper, we augment this concept by introducing SOCCA, a cyber-physical security evaluation technique to plan not only for accidental contingencies but also for malicious compromises. SOCCA presents a new unified formalism to model the cyber-physical system including interconnections among cyber and physical components. The cyber-physical contingency ranking technique employed by SOCCA assesses the potential impacts of events. Contingencies are ranked according to their impact as well as attack complexity. The results are valuable in both cyber and physical domains. From a physical perspective, SOCCA scores power system contingencies based on cyber network configuration, whereas from a cyber perspective, control network vulnerabilities are ranked according to the underlying power system topology.

Proceedings ArticleDOI
27 Jul 2014
TL;DR: This paper proposes an approach that implements the quickly evolving concept of Cyber-Physical Systems for the special case of production systems by means of software agents.
Abstract: Todays increasing volatility of market demands and customer requirements are forcing industrial enterprises to realize and ensure an increased flexibility of production systems. Since current automation concepts and architectures for production systems do not provide the required flexibility sufficiently, new approaches have to be developed. This paper proposes an approach that implements the quickly evolving concept of Cyber-Physical Systems for the special case of production systems by means of software agents. A joined demonstrator of such Cyber-Physical Production System is described and used for the evaluation of the proposed multi-agent approach.

Journal ArticleDOI
TL;DR: The present contribution proposes the conceptualization of the industrial software-product-service system, based upon empirical findings as well as theoretical considerations on the concept of industrial product-service systems and substantiated by suggested future research directions, derived with the help of the proposed conceptualization.

Journal ArticleDOI
TL;DR: This paper proposes a multi-view architecture framework that treats models as views of the underlying system structure and uses structural and semantic mappings to ensure consistency and enable system-level verification in a hierarchical and compositional manner.
Abstract: Cyber-physical systems (CPS) are heterogeneous, because they tightly couple computation, communication, and control along with physical dynamics, which are traditionally considered separately. Without a comprehensive modeling formalism, model-based development of CPS involves using a multitude of models in a variety of formalisms that capture various aspects of the system design, such as software design, networking design, physical models, and protocol design. Without a rigorous unifying framework, system integration and integration of the analysis results for various models remains ad hoc. In this paper, we propose a multi-view architecture framework that treats models as views of the underlying system structure and uses structural and semantic mappings to ensure consistency and enable system-level verification in a hierarchical and compositional manner. Throughout the paper, the theoretical concepts are illustrated using two examples: a quadrotor and an automotive intersection collision avoidance system.

Journal ArticleDOI
TL;DR: This paper provides a survey on communications in CPS and a tutorial of a unified framework, i.e., hybrid system featured by the co-existence of discrete and continuous system states, for the design of communication infrastructure in cyber physical system (CPS).
Abstract: This paper provides a survey on communications in CPS and a tutorial of a unified framework, i.e., hybrid system featured by the co-existence of discrete and continuous system states, for the design of communication infrastructure in cyber physical system (CPS). First, CPS with communication infrastructure is modeled as a hybrid system, in which the discrete system state is the mode of the communication infrastructure while the continuous system state is the state of the physical dynamics. The dynamical system can be considered as being switched among multiple modes corresponding to the discrete system state. Then, the communication infrastructure design is converted to the problems of mode provisioning and scheduling. This framework is applied in the context of smart grid as a special example of CPS and is shown to achieve good performance via numerical simulations.

Book ChapterDOI
22 Sep 2014
TL;DR: ModelPlex is introduced, a method ensuring that verification results about models apply to CPS implementations and a systematic technique to synthesize provably correct monitors automatically from CPS proofs in differential dynamic logic.
Abstract: Formal verification and validation play a crucial role in making cyber-physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior if accurate models of the system can be obtained, including models of the controller and of the physical dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from the real world. If the real system fits to the model, its behavior is guaranteed to satisfy the correctness properties verified w.r.t. the model. Otherwise, all bets are off. This paper introduces ModelPlex, a method ensuring that verification results about models apply to CPS implementations. ModelPlex provides correctness guarantees for CPS executions at runtime: it combines offline verification of CPS models with runtime validation of system executions for compliance with the model. ModelPlex ensures that the verification results obtained for the model apply to the actual system runs by monitoring the behavior of the world for compliance with the model, assuming the system dynamics deviation is bounded. If, at some point, the observed behavior no longer complies with the model so that offline verification results no longer apply, ModelPlex initiates provably safe fallback actions. This paper, furthermore, develops a systematic technique to synthesize provably correct monitors automatically from CPS proofs in differential dynamic logic.

Journal ArticleDOI
TL;DR: It is shown that the proposed notion of robustness captures two intuitive goals: bounded disturbances lead to bounded deviations from nominal behavior, and the effect of a sporadic disturbance disappears in finitely many steps.
Abstract: While the importance of robustness in engineering design is well accepted, it is less clear how to design cyber-physical systems (CPS) for robustness. With the objective of developing a robustness theory for CPS, we introduce a notion of robustness for cyber systems inspired by existing notions of input-output stability in control theory. We show that the proposed notion of robustness captures two intuitive goals: bounded disturbances lead to bounded deviations from nominal behavior, and the effect of a sporadic disturbance disappears in finitely many steps. For cyber systems modeled as finite-state transducers, the proposed notion of robustness can be verified in pseudo-polynomial time. The synthesis problem, consisting of designing a controller enforcing robustness, can also be solved in pseudo-polynomial time.

Reference BookDOI
29 Jan 2014
TL;DR: The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks, to present novel schemes for intrusion detection and prevention.
Abstract: The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective.The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection.The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.