Login / Signup

Second-Order Cone Programming Relaxation of Stealthy Cyberattacks Resulting in Overvoltages in Cyber-Physical Power Systems.

Javad KhazaeiArash Asrari
Published in: IEEE Syst. J. (2022)
Keyphrases