Login / Signup

Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.

Giedre SabaliauskaiteGeok See NgJustin RuthsAditya Mathur
Published in: PRDC (2017)
Keyphrases
  • sensor data
  • sensor networks
  • data streams
  • data mining