Login / Signup
Securing Control and Data Planes From Reconnaissance Attacks Using Distributed Shadow Controllers, Reactive and Proactive Approaches.
Muhammad Faraz Hyder
Muhammad Ali Ismail
Published in:
IEEE Access (2021)
Keyphrases
</>
data sets
database
raw data
data analysis
control system
data processing
training data
distributed data
data structure
data mining techniques
data sources
image data
heterogeneous data
data collection
insider threat
data distribution
high dimensional data
peer to peer
distributed systems
reinforcement learning