"Second-Order Cone Programming Relaxation of Stealthy Cyberattacks ..."

Javad Khazaei, Arash Asrari (2022)

Details and statistics

DOI: 10.1109/JSYST.2021.3108635

access: closed

type: Journal Article

metadata version: 2022-09-10

a service of  Schloss Dagstuhl - Leibniz Center for Informatics