Non-Control-Data Attacks Are Realistic Threats.
Shuo ChenJun XuEmre Can SezerPublished in: USENIX Security Symposium (2005)
Keyphrases
- control system
- database
- data sets
- data collection
- data analysis
- data mining techniques
- statistical analysis
- data sources
- data structure
- training data
- knowledge discovery
- data processing
- computer systems
- synthetic data
- missing data
- prior knowledge
- input data
- database systems
- information systems
- high dimensional data
- spatial data
- data acquisition
- countermeasures