Sign in
Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation.
Nam Nhat Tran
Hemanshu Roy Pota
Quang Nhat Tran
Xuefei Yin
Jiankun Hu
Published in:
Concurr. Comput. Pract. Exp. (2022)
Keyphrases
</>
data sets
database
data mining techniques
data sources
knowledge discovery
third party
original data
access control
sensitive information