Sign in

Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems.

Kento AidaKenta YamadaRyosuke HotchiRyogo Kubo
Published in: IEEE Access (2021)
Keyphrases
  • network structure
  • networked control systems
  • social networks
  • forensic analysis
  • reinforcement learning
  • data quality
  • high quality
  • computer systems
  • neural network model
  • watermarking scheme