August 24, 2020
Author(s)
Hansong Xu, Wei Yu, Xing Liu, David W. Griffith, Nada T. Golmie
… and evolutions of attackers and defenders, as well as their strategies to launch data integrity attacks and protect the … as a realistic IIoT testbed to implement and evaluate strategies at different levels of evolution. The … results indicate the effectiveness of defensive strategies in guarding against various forms of data …