Login / Signup
Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
Jiazi Zhang
Zhigang Chu
Lalitha Sankar
Oliver Kosut
Published in:
CoRR (2017)
Keyphrases
</>
historical data
power system
computer systems
stream data
neural network
end users
data collection
sensor data
injection attacks
database
data analysis
data mining techniques
privacy preserving
information retrieval
short term
sensitive data