Login / Signup

False data injection attacks and the insider threat in smart systems.

Serkan GönenHasan Hüseyin SayanErcan Nurcan YilmazFurkan ÜstünsoyGökçe Karacayilmaz
Published in: Comput. Secur. (2020)
Keyphrases
  • data analysis
  • data sources
  • data processing
  • data collection
  • insider threat
  • database
  • data sets
  • computer systems
  • knowledge discovery
  • data mining
  • end users
  • original data