APA (7th ed.) Citation

Hong, C., Liang, Z., Yang, Y., Li, P., Chen, L., Bi, L., & Zhang, Y. Research on detection and defense methods for false data injection attacks in power systems based on state-space decomposition. Springer.

Chicago Style (17th ed.) Citation

Hong, Chao, Zhihong Liang, Yiwei Yang, Pandeng Li, Lin Chen, Leyi Bi, and Yunan Zhang. Research on Detection and Defense Methods for False Data Injection Attacks in Power Systems Based on State-space Decomposition. Springer.

MLA (9th ed.) Citation

Hong, Chao, et al. Research on Detection and Defense Methods for False Data Injection Attacks in Power Systems Based on State-space Decomposition. Springer.

Warning: These citations may not always be 100% accurate.