Login / Signup
Complementarity Attacks and Control Vectors.
Dennis Longley
Stephen M. Matyas
Published in:
IBM Syst. J. (1993)
Keyphrases
</>
control system
process control
optimal control
control method
malicious attacks
database
real time
neural network
artificial neural networks
wireless sensor networks
signal processing
input data
incomplete information
control problems
malicious users