Sign in

Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.

Marina KrotofilAlvaro A. CárdenasJason LarsenDieter Gollmann
Published in: Int. J. Crit. Infrastructure Prot. (2014)
Keyphrases
  • data analysis
  • data processing
  • data collection
  • data sources
  • knowledge discovery
  • information systems
  • computational intelligence
  • computer systems
  • data mining techniques
  • data visualization