Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Modern Power Systems and Clean Energy"
DOI: 10.1007/s40565-018-0452-y
Abstract: This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power…
read more here.
Keywords:
power systems;
detection data;
power;
set theoretic ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3253022
Abstract: With the advent of technology, data and its analysis are no longer just values and attributes strewn across spreadsheets, they are now seen as a stepping stone to bring about revolution in any significant field.…
read more here.
Keywords:
corruption;
detection algorithm;
corrupted data;
data corruption ... See more keywords