Abstract: Previously, we derived exact relationships between the properties of a linear time-invariant control system and properties of an anomaly detector that quantified the impact an attacker can ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results