The following publications are possibly variants of this publication:
- Interleaved hop-by-hop authentication against false data injection attacks in sensor networksSencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning. tosn, 3(3):14, 2007. [doi]
- False data injection attacks against state estimation in electric power gridsYao Liu, Michael K. Reiter, Peng Ning. ccs 2009: 21-32 [doi]
- False data injection attacks against state estimation in electric power gridsYao Liu, Peng Ning, Michael K. Reiter. tissec, 14(1):13, 2011. [doi]
- The Automatic Defense Mechanism for Malicious Injection AttackJin-Cherng Lin, Jan-Min Chen. IEEEcit 2007: 709-714 [doi]