Login / Signup
Security Defense of Large Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach.
Yuhan Suo
Senchun Chai
Runqi Chai
Zhong-Hua Pang
Yuanqing Xia
Guo-Ping Liu
Published in:
CoRR (2022)
Keyphrases
</>
original data
data sources
database
data processing
knowledge discovery
data collection
injection attacks
access control
unsupervised learning
information security
network security
security analysis