Kate Morrow
Kate Morrow
Visiting Research Programmer, University of Illinois
Verified email at illinois.edu
Cited by
Cited by
Topology Perturbation for Detecting Malicious Data Injection
KL Morrow, E Heine, KM Rogers, RB Bobba, TJ Overbye
System Science (HICSS), 2012 45th Hawaii International Conference on, 2104-2113, 2012
Power Flow Cyber Attacks and Perturbation-Based Defense
KR Davis, KL Morrow, R Bobba, E Heine
SmartGridComm 2012, 2012
Dynamic structure of networks updated according to simple, local rules
KL Morrow, T Rowland, CM Danforth
Physical Review E 80 (1), 016103, 2009
The system can't perform the operation now. Try again later.
Articles 1–3