Abstract: A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results