Login / Signup

Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems.

Gal MorgensternTirza Routtenberg
Published in: IEEE Access (2022)
Keyphrases
  • power system
  • database
  • data collection
  • computational intelligence
  • neural network
  • long term
  • data sources
  • end users
  • data mining techniques
  • cost effective
  • data acquisition
  • injection attacks