Login / Signup
Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection.
Benjamin Gerard
Souad Bezzaoucha Rebaï
Holger Voos
Mohamed Darouach
Published in:
ACC (2018)
Keyphrases
</>
data sources
intrusion detection
cyber security
data collection
data processing
data mining
information systems
data analysis
knowledge discovery
data mining techniques
sensor networks
low cost
high speed
data mining methods