Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?

Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

Research output: Contribution to journalArticlepeer-review

53 Scopus citations

Fingerprint

Dive into the research topics of 'Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?'. Together they form a unique fingerprint.

Engineering & Materials Science