Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment
2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC)(2018)
Key words
networking components,control systems,secure control system,control modification attack,control law,system identification method,machine learning technique,complex cyber-physical systems,attacker identification,Vehicular Platooning
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined