Search

Your search keyword '"False data injection"' showing total 332 results

Search Constraints

Start Over You searched for: Descriptor "False data injection" Remove constraint Descriptor: "False data injection"
332 results on '"False data injection"'

Search Results

151. Sécurité de la Commande Prédictive distribuée sous injection de données faussées

152. Cybersecurity Enhancement of Smart Grid: Attacks, Methods, and Prospects

153. Random Bad State Estimator to Address False Data Injection in Critical Infrastructures

154. A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems

155. Security of Cyber-Physical Systems.

156. Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks.

157. Undetectable Timing-Attack on Linear State-Estimation by Using Rank-1 Approximation.

158. Identification of False Data Injection Attacks With Considering the Impact of Wind Generation and Topology Reconfigurations.

159. Deep learning-based framework for real-time transient stability prediction under stealthy data integrity attacks.

160. A Novel Bilevel False Data Injection Attack Model Based on Pre-and Post-Dispatch

161. Vulnerability Identification and Remediation of FDI Attacks in Islanded DC Microgrids Using Multi-agent Reinforcement Learning

162. False Data Injection of a Robotic Navigation System: Concepts and Simulations

163. False Image Injection Prevention Using iChain

164. Identification scheme of false data injection attack based on deep learning algorithms for smart grids

165. A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed

166. Integration of Failure Detector in Bias Filter for Estimation of False Data Injection Cyberattacks

167. A statistical unsupervised method against false data injection attacks: A visualization-based approach.

168. Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.

169. Trilevel Modeling of Cyber Attacks on Transmission Lines.

170. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements.

171. Attack parameter dependent resilient [formula omitted] path-following control design for autonomous vehicles under cyber attacks.

172. Detection of false data injection attacks in cyber–physical systems using graph convolutional network.

173. False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction.

174. Secure impulsive synchronization control of multi-agent systems under deception attacks.

175. False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure

176. Detection of Lying Electrical Vehicles in Charging Coordination Using Deep Learning

177. A Novel Bilevel False Data Injection Attack Model Based on Pre-and Post-Dispatch

178. Impact of Cyber-attacks on EV Charging Coordination: The Case of Single Point of Failure

179. Detection of False Data Injection Cyber-Attacks in DC Microgrids based on Recurrent Neural Networks

180. A quantum-based approach for offensive security against cyber attacks in electrical infrastructure.

181. Robust fault recognition and correction scheme for induction motors using an effective IoT with deep learning approach.

183. Stealthy False Data Injection Attacks in Feedback Systems Revisited

184. Step-gan : A one-class anomaly detection model with applications to power system security

185. A Network Parameter Database False Data Injection Correction Physics-Based Model: A Machine Learning Synthetic Measurement-Based Approach

186. Generative Learning in Smart Grid

187. Dynamic State Estimation of Generators Under Cyber Attacks

188. Modelling Cyber Attacks on Electricity Market Using Mathematical Programming With Equilibrium Constraints

189. Cognitive Dynamic System for Control and Cyber-Attack Detection in Smart Grid

190. Distributed event-triggered secondary frequency control of islanded AC microgrids under cyber attacks with input time delay.

192. Cyber Security Analysis of Power Networks by Hypergraph Cut Algorithms.

193. Detecting False Data Injection Attacks in AC State Estimation.

194. DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network.

195. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach.

196. Effects of cyber attacks on ac and high-voltage DC interconnected power systems with emulated inertia

197. A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation

198. Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation

199. Unidentifiable Attacks in Electric Power Systems.

200. Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts.

Catalog

Books, media, physical & digital resources