Login / Signup

Vulnerability analysis for simultaneous attack in smart grid security.

Shuva PaulZhen Ni
Published in: ISGT (2017)
Keyphrases
  • smart environments
  • countermeasures
  • smart grid
  • real world
  • malicious attacks
  • malicious users
  • databases
  • machine learning
  • authentication protocol
  • power analysis
  • meeting room
  • ubiquitous environments