Login / Signup
Maximization of Damage from a Non-Detected Cyber-Attack to a Control System with an Invariant-Set-Based Protection.
Dorijan Leko
Mario Vasak
Published in:
ISIE (2021)
Keyphrases
</>
control system
decision making
knowledge discovery
fuzzy logic
critical infrastructure
cyber attacks