Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/ejwcn/HuLYSSW19
%A Hu, Yan
%A Li, Hong
%A Yang, Hong
%A Sun, Yuyan
%A Sun, Limin
%A Wang, Zhiliang
%D 2019
%J EURASIP J. Wireless Comm. and Networking
%K dblp
%P 74
%T Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
%U http://dblp.uni-trier.de/db/journals/ejwcn/ejwcn2019.html#HuLYSSW19
%V 2019
@article{journals/ejwcn/HuLYSSW19,
added-at = {2019-12-19T00:00:00.000+0100},
author = {Hu, Yan and Li, Hong and Yang, Hong and Sun, Yuyan and Sun, Limin and Wang, Zhiliang},
biburl = {https://www.bibsonomy.org/bibtex/250808070ba8b15b2f9d7b7933dc5defe/dblp},
ee = {https://doi.org/10.1186/s13638-019-1389-1},
interhash = {64216e20298986e93736939d90940cdf},
intrahash = {50808070ba8b15b2f9d7b7933dc5defe},
journal = {EURASIP J. Wireless Comm. and Networking},
keywords = {dblp},
pages = 74,
timestamp = {2019-12-20T11:42:00.000+0100},
title = {Detecting stealthy attacks against industrial control systems based on residual skewness analysis.},
url = {http://dblp.uni-trier.de/db/journals/ejwcn/ejwcn2019.html#HuLYSSW19},
volume = 2019,
year = 2019
}