Supervisor Obfuscation Against Covert Actuator Attackers.
Ruochen TaiLiyong LinRong SuPublished in: CoRR (2022)
Keyphrases
- reverse engineering
- information flow
- control system
- malicious attacks
- static analysis
- closed loop
- key players
- control method
- control flow
- malware detection
- dc motor
- software engineering
- terrorist networks
- working principle
- database
- data transformation
- social network analysis
- open source
- website
- social networks
- learning algorithm