Login / Signup
Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids.
Thusitha Dayaratne
Carsten Rudolph
Ariel Liebman
Mahsa Salehi
Published in:
NOMS (2020)
Keyphrases
</>
data collection
database
data sources
injection attacks
missing data
query processing
collaborative filtering
data mining techniques
original data