Chrome Extension
WeChat Mini Program
Use on ChatGLM

Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment

2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC)(2018)

Cited 42|Views9
Key words
networking components,control systems,secure control system,control modification attack,control law,system identification method,machine learning technique,complex cyber-physical systems,attacker identification,Vehicular Platooning
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined