• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Security Defense of Large Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach.

Yuhan SuoSenchun ChaiRunqi ChaiZhong-Hua PangYuanqing XiaGuo-Ping Liu
Published in: CoRR (2022)
Keyphrases
  • original data
  • data sources
  • database
  • data processing
  • knowledge discovery
  • data collection
  • injection attacks
  • access control
  • unsupervised learning
  • information security
  • network security
  • security analysis