Article,

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.

, , , and .
IEEE Trans. Information Forensics and Security, 14 (5): 1337-1350 (2019)

Meta data

Tags

Users

  • @dblp

Comments and Reviews