Login / Signup

Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks.

Fei MiaoQuanyan ZhuMiroslav PajicGeorge J. Pappas
Published in: IEEE Trans. Control. Netw. Syst. (2017)
Keyphrases
  • coding scheme
  • database
  • data collection
  • data analysis
  • data mining techniques
  • injection attacks
  • knowledge discovery
  • data processing
  • real time
  • end users
  • data management
  • virtual environment