Sign in

Detection of stealthy false data injection attacks against networked control systems via active data modification.

Zhong-Hua PangLan-Zhi FanJian SunKun LiuGuo-Ping Liu
Published in: Inf. Sci. (2021)
Keyphrases
  • database
  • data mining
  • end users
  • real time
  • association rules
  • data sources
  • data mining techniques
  • prediction accuracy