Login / Signup

Attack-tolerant networked control system in presence of the controller hijacking attack.

Amer Atta YaseenMireille Bayart
Published in: ICMCIS (2016)
Keyphrases
  • networked control systems
  • control theory
  • neural network
  • pid controller
  • control system
  • real time
  • video sequences
  • fuzzy logic
  • dynamic environments
  • control method