共 18 条
[1]
GAME-THEORETIC MODELS OF ELECTRICITY THEFT DETECTION IN SMART UTILITY NETWORKS PROVIDING NEW CAPABILITIES WITH ADVANCED METERING INFRASTRUCTURE
[J].
IEEE CONTROL SYSTEMS MAGAZINE,
2015, 35 (01)
:66-81
[3]
[Anonymous], 2012, ASIACCS
[4]
Brenner Michael, 2011, 2011 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST 2011), P114, DOI 10.1109/DEST.2011.5936608
[5]
De Luca A., 2000, P 6 IFAC S ROB CONTR, V33, P687, DOI DOI 10.1016/S1474-6670(17)38011-4
[7]
Farokhi F., 2016, SECURE PRIVATE CLOUD
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[9]
Hespanha JP, 2009, LINEAR SYSTEMS THEORY, P1
[10]
Kogiso K, 2015, IEEE DECIS CONTR P, P6836, DOI 10.1109/CDC.2015.7403296