"The authors have produced an interesting book, supplemented by a very rich bibliographic section, which serves as a source for reference and increased awareness to the practitioner community." (Computing Reviews, October, 2017)
Introduction.- Security Threats in Cyber-Physical Systems.- Security Mechanisms for CAN Protocol.- Security-Aware Mapping for CAN-Based Systems.- Security-Aware Mapping for TDMA-Based Systems.- Security-Aware Design for V2V Communication.- FSM-Based Security-Aware Design.- Graph-Based Security-Aware Design.- Conclusions.