Login / Signup

Recursive reachable set computation for on-line safety assessment of the Cyber-Physical System against stealthy cyber attacks.

Cheolhyeon KwonInseok Hwang
Published in: Allerton (2016)
Keyphrases
  • data mining
  • information technology
  • critical infrastructure
  • cyber attacks
  • cyber security