Login / Signup
Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks.
Zhigang Chu
Jiazi Zhang
Oliver Kosut
Lalitha Sankar
Published in:
CoRR (2019)
Keyphrases
</>
power system
database
data sources
query processing
data collection
artificial intelligence
end users