Login / Signup
Security analysis and defense strategy of distributed filtering under false data injection attacks.
Jiayu Zhou
Wen Yang
Heng Zhang
Wei Xing Zheng
Yong Xu
Yang Tang
Published in:
Autom. (2022)
Keyphrases
</>
database
security analysis
data collection
data distribution
injection attacks
information systems
data sources
distributed systems
computer systems
power consumption
rfid tags