Sign in

Robust Demand Response for Device Scheduling under False Data Injection Attacks in Smart Grids.

Thusitha DayaratneCarsten RudolphAriel LiebmanMahsa Salehi
Published in: ISGT-Europe (2020)
Keyphrases
  • data collection
  • data sources
  • database
  • end users
  • knowledge discovery
  • data mining techniques
  • computer systems