Login / Signup
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks.
Fei Miao
Quanyan Zhu
Miroslav Pajic
George J. Pappas
Published in:
IEEE Trans. Control. Netw. Syst. (2017)
Keyphrases
</>
coding scheme
database
data collection
data analysis
data mining techniques
injection attacks
knowledge discovery
data processing
real time
end users
data management
virtual environment