Login / Signup
Supervisor Obfuscation Against Actuator Enablement Attack.
Yuting Zhu
Liyong Lin
Rong Su
Published in:
ECC (2019)
Keyphrases
</>
control system
reverse engineering
closed loop
countermeasures
control method
key exchange protocol
malicious users
control flow
sensor web
malware detection
security measures
static analysis
working principle
data transformation
neural network
data flow
artificial intelligence