|
Volumn , Issue , 2013, Pages 48-53
|
On analysis and design of stealth-resilient control systems
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CLOSED LOOP CONTROL SYSTEMS;
CONTROL SYSTEM ANALYSIS;
CONTROL SYSTEMS;
EMBEDDED SYSTEMS;
LEGACY SYSTEMS;
CYBER INTRUSION;
CYBER-PHYSICAL SYSTEM SECURITIES;
DESIGN STRATEGIES;
DETECTION SYSTEM;
INFORMATION FLOWS;
RESEARCH COMMUNITIES;
STEALTH ATTACKS;
SYSTEM COMPLEXITY;
SECURITY OF DATA;
|
EID: 84890076504
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ISRCS.2013.6623749 Document Type: Conference Paper |
Times cited : (13)
|
References (14)
|