共 50 条
[41]
Distributed Secure State Estimation Against Sparse Attacks: A Sensor Clustering Approach
[J].
2023 62ND ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS, SICE,
2023,
:973-978
[45]
Watermarking-based remote secure sequential fusion estimation under the event-triggered mechanism
[J].
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS,
2024, 361 (12)
[46]
Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
[J].
IEEE CONTROL SYSTEMS LETTERS,
2024, 8
:538-543
[47]
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:868-879
[48]
Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
[J].
2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0,
2019,
:188-192