Login / Signup
A Polynomial Approach to Verifying the Existence of a Threatening Sensor Attacker.
Yin Tong
Yucheng Wang
Alessandro Giua
Published in:
IEEE Control. Syst. Lett. (2022)
Keyphrases
</>
sensor data
sensor networks
multi sensor
vision sensor
case study
model checking
database
high sensitivity
time of flight
fiber bragg grating
range sensors
wireless sensor
sensor fusion
decision trees
information systems
information retrieval
databases
real time