Defending Non-control-data Attacks using Influence Domain Monitoring.
Guimin ZhangQingbao LiZhifeng ChenPing ZhangPublished in: KSII Trans. Internet Inf. Syst. (2018)
Keyphrases
- data sets
- data acquisition
- real time
- data collection
- training data
- raw data
- data analysis
- data distribution
- data processing
- original data
- data points
- domain specific
- data quality
- database
- domain experts
- computer systems
- knowledge discovery
- data sources
- neural network
- data mining techniques
- image data
- synthetic data
- missing data
- wireless sensor networks
- control system
- website
- databases