Sign in

Data-injection Attacks Using Historical Inputs and Outputs.

Rijad AlisicHenrik Sandberg
Published in: ECC (2021)
Keyphrases
  • historical data
  • data collection
  • database
  • data mining techniques
  • original data
  • injection attacks
  • databases
  • end users
  • low cost
  • input data
  • computer systems
  • lightweight
  • missing data