Cited By
View all- Yang YLi YShi YQuevedo D(2024)The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity AttacksIEEE Transactions on Automatic Control10.1109/TAC.2023.333201369:5(3096-3111)Online publication date: May-2024
- Sheldon JZhu WAbdullah ABhupathiraju SSugawara TButler KIslam MRampazzi S(2024)AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00201(331-349)Online publication date: 19-May-2024
- Masood Ahmed KShams RKhan FLuque-Nieto M(2024)Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation TechniquesIEEE Access10.1109/ACCESS.2024.349049812(161096-161133)Online publication date: 2024
- Show More Cited By