Login / Signup
Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems.
Xiu-Xiu Ren
Guang-Hong Yang
Xiao-Guang Zhang
Published in:
IEEE Trans. Ind. Electron. (2023)
Keyphrases
</>
database
sensor data
data collection
data analysis
data processing
injection attacks
data mining
low cost
data mining techniques
computer systems
information sharing
data acquisition