skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index
Refined by: resource type: Text Resources remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Risk assessment and optimal allocation of security measures under stealthy false data injection attacks
Material Type:
Text Resource
Add to My Research

Risk assessment and optimal allocation of security measures under stealthy false data injection attacks

arXiv.org, 2022

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2207.04860

Full text available

Searching Remote Databases, Please Wait