Abstract: A stealthy cyberattack (SCA) aims to gradually drive the system toward instability. Although research is continuing in attack detection algorithms, a resilient control strategy is vital if ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results