Login / Signup
State estimation under false data injection attacks: Security analysis and system protection.
Liang Hu
Zidong Wang
Qing-Long Han
Xiaohui Liu
Published in:
Autom. (2018)
Keyphrases
</>
security analysis
state estimation
data sources
original data
end users
computer systems
database
data mining techniques
encryption scheme
injection attacks