- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal"
- exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics"
- boolean and: separate words by space
e.g., codd model
- boolean or: connect words by pipe symbol (|)
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
found 4 matches
Mohit Goyal, J. Harshan:
Achievable Rates of Attack Detection Strategies in Echo-Assisted Communication. CoRR abs/1901.07013 (2019)
Yuan Chen, Soummya Kar, José M. F. Moura:
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems. IEEE Trans. Control of Network Systems 5(3): 1157-1168 (2018)
Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel:
Detection of attack strategies. CRiSIS 2013: 1-8
Intelligent detection and response strategies for network infrastructure attacks. Royal Holloway, University of London, UK 2007
loading more results
failed to load more results, please try again later
The full-text search results are provided via , courtesy of AI2.
found ?? matches
- service temporarily not available