Comparison of corrupted sensor data detection methods in detecting stealthy attacks on cyber-physical systems

G. Sabaliauskaite, G.S. Ng, J. Ruths, A. Mathur

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

1 Citation (Scopus)

Fingerprint

Dive into the research topics of 'Comparison of corrupted sensor data detection methods in detecting stealthy attacks on cyber-physical systems'. Together they form a unique fingerprint.

Computer Science