Sign in
Data-injection Attacks Using Historical Inputs and Outputs.
Rijad Alisic
Henrik Sandberg
Published in:
ECC (2021)
Keyphrases
</>
historical data
data collection
database
data mining techniques
original data
injection attacks
databases
end users
low cost
input data
computer systems
lightweight
missing data