Fingerprint
Dive into the research topics of 'Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut
Research output: Contribution to journal › Article › peer-review