Login / Signup

Using anomalous event patterns in control systems for tamper detection.

William L. SousanRobin A. GandhiQiuming ZhuWilliam R. Mahoney
Published in: CSIIRW (2011)
Keyphrases
  • tamper detection
  • control system
  • image authentication
  • event detection
  • anomaly detection
  • data hiding