Login / Signup
A unifying approach for the identification of application-driven stealthy attacks on mobile CPS.
Vu Nguyen
Mina Guirguis
George K. Atia
Published in:
Allerton (2014)
Keyphrases
</>
decision support
mobile devices
malicious attacks
genetic algorithm
access control
computing environments
m learning