Sign in

A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks.

Walter LuciaBruno SinopoliGiuseppe Franzè
Published in: SOSCYPS@CPSWeek (2016)
Keyphrases
  • data collection
  • data processing
  • database
  • data analysis
  • end users
  • knowledge discovery
  • injection attacks
  • data sources
  • computer systems
  • data acquisition
  • real time
  • data mining
  • social networks
  • cyber physical systems