Login / Signup
Topology Perturbation for Detecting Malicious Data Injection.
Kate L. Morrow
Erich Heine
Katherine M. Rogers
Rakeshbabu Bobba
Thomas J. Overbye
Published in:
HICSS (2012)
Keyphrases
</>
data analysis
data structure
data sources
knowledge discovery
data mining techniques
computer systems