Login / Signup
Adaptive Modelling for Security Analysis of Networked Control Systems.
Jan Wolf
Felix Wieczorek
Frank Schiller
Gerhard Hansch
Norbert Wiedermann
Martin Hutle
Published in:
ICS-CSR (2016)
Keyphrases
</>
security analysis
networked control systems
public key
smart card
security requirements
adaptive control
encryption scheme
control method
long time delay
real time
feedback control
user authentication
control law
signature scheme
control theory