@dblp

Risk assessment and optimal allocation of security measures under stealthy false data injection attacks.

, , and . CoRR, (2022)

Links and resources

Tags