Login / Signup
Vulnerability analysis for simultaneous attack in smart grid security.
Shuva Paul
Zhen Ni
Published in:
ISGT (2017)
Keyphrases
</>
smart environments
countermeasures
smart grid
real world
malicious attacks
malicious users
databases
machine learning
authentication protocol
power analysis
meeting room
ubiquitous environments