Abstract: Although state estimation using a bad data detector (BDD) is a key procedure employed in power systems, the detector is vulnerable to false data injection attacks (FDIAs). Substantial deep ...
Be honest: Do you really make the effort to read privacy policies of companies and websites you deal with? Most people don’t, and we can’t blame them. Privacy ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results