Login / Signup
Covert attack on a discrete-time system with limited use of the available disruption resources.
Efstathios Kontouras
Anthony Tzes
Leonidas Dritsas
Published in:
ECC (2015)
Keyphrases
</>
limited resources
learning resources
resource management
information flow
computing resources
information resources
web resources
countermeasures
resource constraints
data sets
markov chain
steady state
resource allocation
loss probability