Sign in

Vulnerability Assessment of False Data Injection Attacks on Optimal Power Flow.

Rajvir KaurJustin AlbrethsenDavid K. Y. YauShahram Ghahremani
Published in: ISGT Asia (2021)
Keyphrases
  • database
  • input data
  • original data
  • data mining
  • injection attacks