Security analysis of control system anomaly detectors.
David UmsonstHenrik SandbergAlvaro A. CárdenasPublished in: ACC (2017)
Keyphrases
- security analysis
- control system
- public key
- anomaly detection
- smart card
- high security
- security requirements
- security model
- authentication protocol
- intrusion detection
- encryption scheme
- user authentication
- encryption algorithm
- security properties
- real time
- image encryption
- mutual authentication
- secret key
- private key
- distributed environment
- network traffic
- software architecture
- fine grained
- information systems