Sign in

Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation.

Nam Nhat TranHemanshu Roy PotaQuang Nhat TranXuefei YinJiankun Hu
Published in: Concurr. Comput. Pract. Exp. (2022)
Keyphrases
  • data sets
  • database
  • data mining techniques
  • data sources
  • knowledge discovery
  • third party
  • original data
  • access control
  • sensitive information