Set-theoretic detection of data corruption attacks on cyber physical power systems
Crossref DOI link: https://doi.org/10.1007/s40565-018-0452-y
Published Online: 2018-09-18
Published Print: 2018-09
Update policy: https://doi.org/10.1007/springer_crossmark_policy
KONTOURAS, Efstathios
TZES, Anthony http://orcid.org/0000-0003-3709-2810
DRITSAS, Leonidas
Text and Data Mining valid from 2018-09-01
Article History
Received: 28 November 2017
Accepted: 31 July 2018
First Online: 18 September 2018