Login / Signup
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks.
Walter Lucia
Bruno Sinopoli
Giuseppe Franzè
Published in:
SOSCYPS@CPSWeek (2016)
Keyphrases
</>
data collection
data processing
database
data analysis
end users
knowledge discovery
injection attacks
data sources
computer systems
data acquisition
real time
data mining
social networks
cyber physical systems