Sign in

Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids.

Thusitha DayaratneCarsten RudolphAriel LiebmanMahsa Salehi
Published in: NOMS (2020)
Keyphrases
  • data collection
  • database
  • data sources
  • injection attacks
  • missing data
  • query processing
  • collaborative filtering
  • data mining techniques
  • original data