Login / Signup
On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors.
Derui Ding
Guoliang Wei
Sunjie Zhang
Yurong Liu
Fuad E. Alsaadi
Published in:
Neurocomputing (2017)
Keyphrases
</>
countermeasures
object detection
cyber attacks
denial of service attacks
multimedia
markov chain
incomplete information
scheduling algorithm
dos attacks
malicious attacks
malicious users