Login / Signup
Cyber-Attack on P2P Energy Transaction Between Connected Electric Vehicles: A False Data Injection Detection Based Machine Learning Model.
Dhaou Said
Mayssa Elloumi
Lyes Khoukhi
Published in:
IEEE Access (2022)
Keyphrases
</>
machine learning
data collection
data analysis
network structure
data acquisition
fuzzy sets
peer to peer
computer systems