Abstract: This study addresses a tampered-data recovery problem for linear discrete-time systems with completely unknown system dynamics under stealthy attacks. The basic idea is to identify the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results