Login / Signup

Security analysis and defense strategy of distributed filtering under false data injection attacks.

Jiayu ZhouWen YangHeng ZhangWei Xing ZhengYong XuYang Tang
Published in: Autom. (2022)
Keyphrases
  • database
  • security analysis
  • data collection
  • data distribution
  • injection attacks
  • information systems
  • data sources
  • distributed systems
  • computer systems
  • power consumption
  • rfid tags