Login / Signup
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks.
Fei Miao
Quanyan Zhu
Miroslav Pajic
George J. Pappas
Published in:
CoRR (2016)
Keyphrases
</>
coding scheme
data mining techniques
database
data processing
injection attacks
data collection
real time
mobile devices
data sources
data warehouse
computer systems
ambient intelligence
human activities