Login / Signup
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems.
Giedre Sabaliauskaite
Geok See Ng
Justin Ruths
Aditya Mathur
Published in:
PRDC (2017)
Keyphrases
</>
sensor data
sensor networks
data streams
data mining