Supervisor Fortification Against Covert Actuator Attacks.
Ruochen TaiLiyong LinRong SuPublished in: CDC (2023)
Keyphrases
- countermeasures
- control system
- watermarking scheme
- malicious attacks
- information flow
- traffic analysis
- database
- website
- terrorist attacks
- real time
- malicious users
- key players
- denial of service attacks
- security threats
- image watermarking
- security protocols
- computer security
- network analysis
- java card
- terrorist networks
- security mechanisms
- closed loop
- social network analysis
- social networks
- digital image watermarking
- working principle