Sign in

Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems.

Jichao BiShibo HeFengji LuoJiming ChenDa-Wen HuangMingyang Sun
Published in: TrustCom (2022)
Keyphrases
  • database
  • data collection
  • computer systems
  • data sources
  • end users
  • data mining techniques
  • injection attacks