Login / Signup

State estimation under false data injection attacks: Security analysis and system protection.

Liang HuZidong WangQing-Long HanXiaohui Liu
Published in: Autom. (2018)
Keyphrases
  • security analysis
  • state estimation
  • data sources
  • original data
  • end users
  • computer systems
  • database
  • data mining techniques
  • encryption scheme
  • injection attacks