System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy (Q2082774)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy |
scientific article; zbMATH DE number 7596383
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy |
scientific article; zbMATH DE number 7596383 |
Statements
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy (English)
0 references
4 October 2022
0 references
system identification
0 references
binary-valued observations
0 references
denial-of-service attacks
0 references
data tampering attacks
0 references
0 references
0 references
0 references
0 references
0.9901676
0 references
0.9558378
0 references
0.93615335
0 references
0.8638264
0 references
0.8634362
0 references
0.8607762
0 references
0.8473276
0 references
0.8448709
0 references
0.83952683
0 references