Sign in

Resilient Defense of False Data Injection Attacks in Smart Grids via Virtual Hidden Networks.

Xiaoyuan LuoJunnan HeXinyu WangYuyan ZhangXinping Guan
Published in: IEEE Internet Things J. (2023)
Keyphrases
  • data collection
  • database
  • data sources
  • computer systems
  • original data
  • information loss
  • database systems
  • end users
  • knowledge discovery
  • data mining techniques
  • network security
  • injection attacks