Login / Signup
False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
Fangfei Li
Yang Tang
Published in:
IEEE Trans. Cybern. (2020)
Keyphrases
</>
data collection
data sources
data analysis
knowledge discovery
data processing
network structure
data management
sensor data