Sign in

Risk assessment and optimal allocation of security measures under stealthy false data injection attacks.

Sribalaji Coimbatore AnandAndré M. H. TeixeiraAnders Ahlén
Published in: CoRR (2022)
Keyphrases
  • risk assessment
  • data collection
  • data sources
  • computer systems
  • historical data
  • data processing
  • optimal allocation
  • end users
  • database
  • data analysis
  • low cost
  • knowledge management