Sign in

Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems.

Mehdi HosseinzadehBruno SinopoliEmanuele Garone
Published in: Allerton (2019)
Keyphrases
  • cyber physical systems
  • cyber physical
  • social networks
  • physical world
  • cyber security
  • artificial intelligence
  • anomaly detection
  • decision making
  • information technology
  • data processing
  • embedded systems