Stealthy protocols: metrics and open problems
From MaRDI portal
(Redirected from Publication:1708705)
Recommendations
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Stealthy attacks and attack-resilient interval observers
- Network-Hiding Communication and Applications to Multi-party Protocols
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
Cited in
(2)
This page was built for publication: Stealthy protocols: metrics and open problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1708705)