Amanote Research

Amanote Research

    RegisterSign In

Detection and Identification of Data Attacks in Power System

doi 10.1109/acc.2012.6315445
Full Text
Open PDF
Abstract

Available in full text

Date

June 1, 2012

Authors
H. SandbergK. H. Johansson
Publisher

IEEE


Related search

Set-Theoretic Detection of Data Corruption Attacks on Cyber Physical Power Systems

Journal of Modern Power Systems and Clean Energy
Renewable EnergyPower Technologythe EnvironmentSustainabilityEnergy Engineering
2018English

Intrusion Detection System and Its Attacks Detection: Comparative

International Journal of Advanced Research in Computer Science and Software Engineering
2017English

Cyber Attacks on Intrusion Detection System

International Journal of Information Sciences and Techniques
2016English

Application of Kalman Filter to Bad-Data Detection in Power System

2010English

Advanced Techniques for Power System Identification From Measured Data

2008English

Distributed Intrusion Detection System for Detection of GrayHole Attacks in a Smart Grid

International Journal of Advanced Research in Computer Science and Software Engineering
2017English

Intrusion Detection and Response for System and Network Attacks

English

A Systematic Review of Re-Identification Attacks on Health Data

PLoS ONE
Multidisciplinary
2011English

A Review of Harmonics Detection and Measurement in Power System

International Journal of Computer Applications
2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy