{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q314801","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q314801","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q314801","kernelVersion":"v1","immutable":true,"modified":"2026-03-23T15:24:30Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q314801","name":"Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements","headline":"Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements","description":"scientific article; zbMATH DE number 6628241","url":"https://portal.mardi4nfdi.de/entity/Q314801","datePublished":"2016-09-16","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q314798"},{"@id":"https://portal.mardi4nfdi.de/entity/Q314799"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1915796"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q107189"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1016/J.JCSS.2016.04.005","url":"https://doi.org/10.1016/J.JCSS.2016.04.005"},"sameAs":["https://doi.org/10.1016/J.JCSS.2016.04.005"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q4579762"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3016258"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3058517"}]},"provenance":{"prov:generatedAtTime":"2026-03-23T15:24:30Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}