Login / Signup
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems.
Yuan Chen
Soummya Kar
José M. F. Moura
Published in:
CoRR (2016)
Keyphrases
</>
cyber physical systems
anomaly detection
cyber physical
data mining
decision making
low cost
power consumption
cyber security