Search
Now showing items 1-5 of 5
Resilient Detection in the Presence of Integrity Attacks
Publisher: IEEE
Year: 2014
Detecting Integrity Attacks on SCADA Systems
Publisher: IEEE
Year: 2014
Network observability and localization of sources of diffusion in tree networks with missing edges
Publisher: IEEE
Year: 2014
Network observability for source localization in graphs with unobserved edges
Publisher: IEEE
Year: 2014
Detection in Adversarial Environments
Publisher: IEEE
Year: 2014