• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643049)   Today's Articles (3899)   Subscriber (50547)
For: Yang M, Zhang H, Peng C, Wang Y. A penalty-based adaptive secure estimation for power systems under false data injection attacks. Inf Sci (N Y) 2020;508:380-92. [DOI: 10.1016/j.ins.2019.08.080] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
Number Cited by Other Article(s)
1
Shao J, Ye Z, Zhang D, Yan H, Zhu J. Injection attack estimation of networked control systems subject to hidden DoS attack. ISA TRANSACTIONS 2022;129:1-14. [PMID: 35216804 DOI: 10.1016/j.isatra.2022.02.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/04/2021] [Revised: 01/20/2022] [Accepted: 02/05/2022] [Indexed: 06/14/2023]
2
Man-in-the-middle attack against cyber-physical systems under random access protocol. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.07.083] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
3
Qian J, Wang P, Pu C, Chen G. Joint application of multi-object beetle antennae search algorithm and BAS-BP fuel cost forecast network on optimal active power dispatch problems. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2021.107149] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA