Login / Signup
Attack-tolerant networked control system in presence of the controller hijacking attack.
Amer Atta Yaseen
Mireille Bayart
Published in:
ICMCIS (2016)
Keyphrases
</>
networked control systems
control theory
neural network
pid controller
control system
real time
video sequences
fuzzy logic
dynamic environments
control method