Login / Signup

On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors.

Derui DingGuoliang WeiSunjie ZhangYurong LiuFuad E. Alsaadi
Published in: Neurocomputing (2017)
Keyphrases
  • countermeasures
  • object detection
  • cyber attacks
  • denial of service attacks
  • multimedia
  • markov chain
  • incomplete information
  • scheduling algorithm
  • dos attacks
  • malicious attacks
  • malicious users