Articles with "data corruption" as a keyword



Photo from wikipedia

Set-theoretic detection of data corruption attacks on cyber physical power systems

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Modern Power Systems and Clean Energy"

DOI: 10.1007/s40565-018-0452-y

Abstract: This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power… read more here.

Keywords: power systems; detection data; power; set theoretic ... See more keywords
Photo from wikipedia

PAACDA: Comprehensive Data Corruption Detection Algorithm

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253022

Abstract: With the advent of technology, data and its analysis are no longer just values and attributes strewn across spreadsheets, they are now seen as a stepping stone to bring about revolution in any significant field.… read more here.

Keywords: corruption; detection algorithm; corrupted data; data corruption ... See more keywords