Login / Signup
Detection of stealthy false data injection attacks against networked control systems via active data modification.
Zhong-Hua Pang
Lan-Zhi Fan
Jian Sun
Kun Liu
Guo-Ping Liu
Published in:
Inf. Sci. (2021)
Keyphrases
</>
database
data mining
end users
real time
association rules
data sources
data mining techniques
prediction accuracy