Login / Signup
Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization.
Zhigang Chu
Jiazi Zhang
Oliver Kosut
Lalitha Sankar
Published in:
CoRR (2016)
Keyphrases
</>
power system
database
injection attacks
data sources
artificial intelligence
computational intelligence
cloud computing
database management systems