Login / Signup
Set-based replay attack detection in closed-loop systems using a plug & play watermarking approach.
Carlos Trapiello
Vicenç Puig
Published in:
SysTol (2019)
Keyphrases
</>
closed loop
attack detection
control system
open loop
control law
feedback control
data mining
computer systems
control scheme
parameter identification
mobile robot
feature set
data processing