Login / Signup

Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach.

Yuhan SuoSenchun ChaiRunqi ChaiZhong-Hua PangYuanqing XiaGuo-Ping Liu
Published in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
  • database
  • data processing
  • intrusion detection
  • original data
  • information security
  • data sources
  • end users
  • data collection
  • network security
  • data mining
  • knowledge discovery
  • attack detection