Login / Signup

Attacks Detection and Security Control Against False Data Injection Attacks Based on Interval Type-2 Fuzzy System.

Yuhang ChenYue LongTieshan Li
Published in: IECON (2022)
Keyphrases
  • injection attacks
  • database
  • control system
  • real time
  • neural network
  • input output
  • original data
  • security protocols
  • sql injection