Sign in

Protection Against Graph-Based False Data Injection Attacks on Power Systems.

Gal MorgensternJip KimJames AndersonGil ZussmanTirza Routtenberg
Published in: CoRR (2023)
Keyphrases
  • power system
  • data sources
  • database
  • data collection
  • historical data
  • computational intelligence
  • neural network
  • information systems
  • long term
  • computer systems
  • network structure
  • power generation
  • injection attacks