Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

Zhonghua Pang, Yuan Fu, Haibin Guo, Jian Sun*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

29 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies'. Together they form a unique fingerprint.

Computer Science