Login / Signup
Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems.
Gal Morgenstern
Tirza Routtenberg
Published in:
IEEE Access (2022)
Keyphrases
</>
power system
database
data collection
computational intelligence
neural network
long term
data sources
end users
data mining techniques
cost effective
data acquisition
injection attacks