Login / Signup
Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks.
Younan Zhao
Peng Gu
Fanglai Zhu
Tianyi Liu
Runjie Shen
Published in:
Appl. Math. Comput. (2023)
Keyphrases
</>
control scheme
complex networks
data processing
real time
data analysis
computer systems
physical layer
control system
dynamic model
injection attacks
information systems
data mining techniques
experimental data
closed loop
ubiquitous computing