Cite
Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems.
MLA
Ren, Xiu-Xiu, et al. “Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems.” IEEE Transactions on Industrial Electronics, vol. 70, no. 3, Mar. 2023, pp. 2907–15. EBSCOhost, https://doi.org/10.1109/TIE.2022.3169829.
APA
Ren, X.-X., Yang, G.-H., & Zhang, X.-G. (2023). Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems. IEEE Transactions on Industrial Electronics, 70(3), 2907–2915. https://doi.org/10.1109/TIE.2022.3169829
Chicago
Ren, Xiu-Xiu, Guang-Hong Yang, and Xiao-Guang Zhang. 2023. “Protocol-Based Optimal Stealthy Data-Injection Attacks via Compromised Sensors in Cyber-Physical Systems.” IEEE Transactions on Industrial Electronics 70 (3): 2907–15. doi:10.1109/TIE.2022.3169829.