Login / Signup

False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.

Fangfei LiYang Tang
Published in: IEEE Trans. Cybern. (2020)
Keyphrases
  • data collection
  • data sources
  • data analysis
  • knowledge discovery
  • data processing
  • network structure
  • data management
  • sensor data