Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?

Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

Research output: Contribution to journalArticlepeer-review

56 Scopus citations

Fingerprint

Dive into the research topics of 'Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?'. Together they form a unique fingerprint.

Computer Science

Engineering

Mathematics

Keyphrases