News
In this paper, the control performance of a bilateral teleoperation system is studied in the presence of a data injection attack. It is shown that even a simple data injection attack has the potential ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results