Sequential-Mining-Based Vulnerable Branches Identification for the Transmission Network Under Continuous Load Redistribution Attacks.
Yigu LiuShibin GaoJian ShiXiaoguang WeiZhu HanPublished in: IEEE Trans. Smart Grid (2020)
Keyphrases
- traffic analysis
- security threats
- peer to peer
- transmission delay
- network intrusion
- traffic load
- network traffic
- network topologies
- security risks
- complex networks
- data mining
- network structure
- load balancing
- intrusion prevention
- network management
- transmission rate
- network nodes
- network monitoring
- cyber attacks
- countermeasures
- computer networks
- information security
- intrusion detection
- data mining techniques
- wireless sensor networks