Login / Signup

Set-based replay attack detection in closed-loop systems using a plug & play watermarking approach.

Carlos TrapielloVicenç Puig
Published in: SysTol (2019)
Keyphrases
  • closed loop
  • attack detection
  • control system
  • open loop
  • control law
  • feedback control
  • data mining
  • computer systems
  • control scheme
  • parameter identification
  • mobile robot
  • feature set
  • data processing