Structural-constrained Methods for the Identification of Unobservable False Data Injection Attacks in Power Systems

Gal Morgenstern, Tirza Routtenberg

Research output: Working paper/PreprintPreprint

12 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Structural-constrained Methods for the Identification of Unobservable False Data Injection Attacks in Power Systems'. Together they form a unique fingerprint.

Engineering & Materials Science