Login / Signup
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks.
Ipsita Koley
Sunandan Adhikary
Soumyajit Dey
Published in:
CoRR (2022)
Keyphrases
</>
data collection
injection attacks
knowledge discovery
missing data
database
data sources
data mining techniques
computer systems