Login / Signup
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks.
Zhigang Chu
Jiazi Zhang
Oliver Kosut
Lalitha Sankar
Published in:
CoRR (2018)
Keyphrases
</>
injection attacks
data mining techniques
database
recommender systems
data sources
data collection
web data
knowledge discovery
computer systems
missing data
original data
sql injection