no code implementations • 1 Oct 2021 • Subhash Lakshminarayana, Saurav Sthapit, Hamidreza Jahangir, Carsten Maple, H Vincent Poor
Timely detection and identification of any compromised nodes are essential to minimise the adverse effects of these attacks on power grid operations.