Login / Signup

Topology Perturbation for Detecting Malicious Data Injection.

Kate L. MorrowErich HeineKatherine M. RogersRakeshbabu BobbaThomas J. Overbye
Published in: HICSS (2012)
Keyphrases
  • data analysis
  • data structure
  • data sources
  • knowledge discovery
  • data mining techniques
  • computer systems