A credibility measurement method of smart grid data
暂无分享,去创建一个
[1] Li Zhang,et al. Evaluation Approach of Subjective Trust Based on Cloud Model: Evaluation Approach of Subjective Trust Based on Cloud Model , 2010 .
[2] Chin-Chen Chang,et al. A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems , 2015, J. Inf. Hiding Multim. Signal Process..
[3] Shyh-Jier Huang,et al. Enhancement of anomalous data mining in power system predicting-aided state estimation , 2004, IEEE Transactions on Power Systems.
[4] Chen Zhong,et al. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory , 2003 .
[5] Zhang Tin. Substation Topology Error Identification Based on Uncertainty Reasoning , 2014 .
[6] Jinping Hao,et al. Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.
[7] Shuai Wang,et al. An Evaluation Approach of Subjective Trust Based on Cloud Model , 2008, 2008 International Conference on Computer Science and Software Engineering.
[8] Yuwan Gu,et al. The Research of Trusted Attribute Based on Model-Driven of MDA , 2014 .
[9] Chih-Cheng Hung,et al. Credibilistic Clustering: The Model and Algorithms , 2015, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Wang Hai-yan. Trust evaluation model based on improved D-S evidence theory , 2013 .
[11] F. Perez-Hidalgo,et al. Bad Data Detection of Unequal Magnitudes in State Estimation of Power Systems [Power Engineering Letters] , 2002 .
[12] Yu Wei,et al. Automatically Discovering of Inconsistency Among Cross-Source Data Based on Web Big Data , 2015 .
[13] Zhao Qiu,et al. A Method for Assessment of Trust Relationship Strength Based on the Improved D-S Evidence Theory , 2014 .
[14] Gao Kunlu. Development and Process of Cybersecurity Protection Architecture for Smart Grid Dispatching and Control Systems , 2015 .