Abstract: This article investigates the problem of attack detection for cyber-physical systems with input constraints in the presence of command and sensor attacks. For detecting a wider range of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results