Login / Signup
Denial-of-service attacks on cyber-physical systems with two-hop networks under round-robin protocol.
Wei Xing
Xudong Zhao
Ning Zhao
Guangdeng Zong
Ben Niu
Ning Xu
Published in:
Syst. Control. Lett. (2023)
Keyphrases
</>
denial of service attacks
round robin
end hosts
cyber physical systems
dos attacks
load balancing
security threats
intrusion detection system
network security
computer networks
cyber security
ddos attacks
physical world
ip addresses
control system
network structure
computer systems
access control
distributed systems