Login / Signup
Attacks Detection and Security Control Against False Data Injection Attacks Based on Interval Type-2 Fuzzy System.
Yuhang Chen
Yue Long
Tieshan Li
Published in:
IECON (2022)
Keyphrases
</>
injection attacks
database
control system
real time
neural network
input output
original data
security protocols
sql injection