1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references25

          • Record: found
          • Abstract: not found
          • Article: not found

          Extracting and composing robust features with denoising autoencoders

            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Convex Optimization

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              False data injection attacks against state estimation in electric power grids

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                IEEE Internet of Things Journal
                IEEE Internet Things J.
                Institute of Electrical and Electronics Engineers (IEEE)
                2327-4662
                2372-2541
                September 2020
                September 2020
                : 7
                : 9
                : 8462-8471
                Article
                10.1109/JIOT.2020.2991693
                078da600-2dcb-468a-a94a-6492f314e184
                © 2020

                https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html

                https://doi.org/10.15223/policy-029

                https://doi.org/10.15223/policy-037

                History

                Comments

                Comment on this article