Login / Signup

Cyber-Attack on P2P Energy Transaction Between Connected Electric Vehicles: A False Data Injection Detection Based Machine Learning Model.

Dhaou SaidMayssa ElloumiLyes Khoukhi
Published in: IEEE Access (2022)
Keyphrases
  • machine learning
  • data collection
  • data analysis
  • network structure
  • data acquisition
  • fuzzy sets
  • peer to peer
  • computer systems