Sign in

Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems.

Xiu-Xiu RenGuang-Hong YangXiao-Guang Zhang
Published in: IEEE Trans. Ind. Electron. (2023)
Keyphrases
  • database
  • sensor data
  • data collection
  • data analysis
  • data processing
  • injection attacks
  • data mining
  • low cost
  • data mining techniques
  • computer systems
  • information sharing
  • data acquisition