Login / Signup
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach.
Yuhan Suo
Senchun Chai
Runqi Chai
Zhong-Hua Pang
Yuanqing Xia
Guo-Ping Liu
Published in:
IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
</>
database
data processing
intrusion detection
original data
information security
data sources
end users
data collection
network security
data mining
knowledge discovery
attack detection