Sort by
Refine Your Search
- 
                
                
                -critical decisions in real time. These systems rely heavily on sensor data (e.g., GPS, pressure transducers, image processors), making them vulnerable to stealthy threats like False Data Injection (FDI) and 
Searches related to sensor algorithm
  Enter an email to receive alerts for sensor-algorithm positions