Login / Signup
Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids.
Nima Nikmehr
Solmaz Moradi Moghadam
Published in:
IET Cyper-Phys. Syst.: Theory & Appl. (2019)
Keyphrases
</>
data analysis
game theoretic
statistical analysis
data sets
database
data points
data collection
data acquisition
game theory
multi agent systems
machine learning
objective function
lower bound
evolutionary algorithm
special case
data mining techniques