Login / Signup
Towards Bounded Synthesis of Resilient Supervisors Against Actuator Attacks.
Liyong Lin
Yuting Zhu
Rong Su
Published in:
CoRR (2019)
Keyphrases
</>
countermeasures
control system
malicious attacks
closed loop
security mechanisms
security protocols
traffic analysis
watermarking scheme
working principle
neural network
access control
control method
watermarking technique
computer security
security risks
chosen plaintext