Login / Signup
Using anomalous event patterns in control systems for tamper detection.
William L. Sousan
Robin A. Gandhi
Qiuming Zhu
William R. Mahoney
Published in:
CSIIRW (2011)
Keyphrases
</>
tamper detection
control system
image authentication
event detection
anomaly detection
data hiding