No Cover Image

Conference Paper/Proceeding/Abstract 391 views

Detecting injection attacks in linear time invariant systems

Peter Loh, Giedre Sabaliauskaite Orcid Logo, Aditya Mathur

2013 IEEE Conference on Cybernetics and Intelligent Systems (CIS)

Swansea University Author: Giedre Sabaliauskaite Orcid Logo

Full text not available from this repository: check for access using links below.

Published in: 2013 IEEE Conference on Cybernetics and Intelligent Systems (CIS)
ISBN: 978-1-4799-1072-4 978-1-4799-1075-5
ISSN: 2326-8123 2326-8239
Published: IEEE 2014
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61859
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2022-12-01T14:06:45Z
last_indexed 2023-01-13T19:22:54Z
id cronfa61859
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-12-01T14:06:46.9217666</datestamp><bib-version>v2</bib-version><id>61859</id><entry>2022-11-09</entry><title>Detecting injection attacks in linear time invariant systems</title><swanseaauthors><author><sid>6a674e2dbda3ec5f20599ce38199a7c3</sid><ORCID>0000-0003-1183-7001</ORCID><firstname>Giedre</firstname><surname>Sabaliauskaite</surname><name>Giedre Sabaliauskaite</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-11-09</date><deptcode>SCS</deptcode><abstract/><type>Conference Paper/Proceeding/Abstract</type><journal>2013 IEEE Conference on Cybernetics and Intelligent Systems (CIS)</journal><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher>IEEE</publisher><placeOfPublication/><isbnPrint>978-1-4799-1072-4</isbnPrint><isbnElectronic>978-1-4799-1075-5</isbnElectronic><issnPrint>2326-8123</issnPrint><issnElectronic>2326-8239</issnElectronic><keywords/><publishedDay>3</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-03-03</publishedDate><doi>10.1109/iccis.2013.6751583</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-12-01T14:06:46.9217666</lastEdited><Created>2022-11-09T22:50:26.4400614</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Peter</firstname><surname>Loh</surname><order>1</order></author><author><firstname>Giedre</firstname><surname>Sabaliauskaite</surname><orcid>0000-0003-1183-7001</orcid><order>2</order></author><author><firstname>Aditya</firstname><surname>Mathur</surname><order>3</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2022-12-01T14:06:46.9217666 v2 61859 2022-11-09 Detecting injection attacks in linear time invariant systems 6a674e2dbda3ec5f20599ce38199a7c3 0000-0003-1183-7001 Giedre Sabaliauskaite Giedre Sabaliauskaite true false 2022-11-09 SCS Conference Paper/Proceeding/Abstract 2013 IEEE Conference on Cybernetics and Intelligent Systems (CIS) IEEE 978-1-4799-1072-4 978-1-4799-1075-5 2326-8123 2326-8239 3 3 2014 2014-03-03 10.1109/iccis.2013.6751583 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University 2022-12-01T14:06:46.9217666 2022-11-09T22:50:26.4400614 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Peter Loh 1 Giedre Sabaliauskaite 0000-0003-1183-7001 2 Aditya Mathur 3
title Detecting injection attacks in linear time invariant systems
spellingShingle Detecting injection attacks in linear time invariant systems
Giedre Sabaliauskaite
title_short Detecting injection attacks in linear time invariant systems
title_full Detecting injection attacks in linear time invariant systems
title_fullStr Detecting injection attacks in linear time invariant systems
title_full_unstemmed Detecting injection attacks in linear time invariant systems
title_sort Detecting injection attacks in linear time invariant systems
author_id_str_mv 6a674e2dbda3ec5f20599ce38199a7c3
author_id_fullname_str_mv 6a674e2dbda3ec5f20599ce38199a7c3_***_Giedre Sabaliauskaite
author Giedre Sabaliauskaite
author2 Peter Loh
Giedre Sabaliauskaite
Aditya Mathur
format Conference Paper/Proceeding/Abstract
container_title 2013 IEEE Conference on Cybernetics and Intelligent Systems (CIS)
publishDate 2014
institution Swansea University
isbn 978-1-4799-1072-4
978-1-4799-1075-5
issn 2326-8123
2326-8239
doi_str_mv 10.1109/iccis.2013.6751583
publisher IEEE
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 0
active_str 0
published_date 2014-03-03T04:21:01Z
_version_ 1763754388827930624
score 11.016235