Academic literature on the topic 'Power tampering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Power tampering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Power tampering"
Agarwal, Shubham, and Mayur Agarwal. "Wireless Power Theft Monitoring System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 36–39. http://dx.doi.org/10.51976/ijari.121309.
Full textTan, Huijuan, Wenxin Guo, Shiming Li, Wenjie Zheng, and Qian Li. "Power system topological node tamper detection method based on fuzzy graph theory." Journal of Physics: Conference Series 2728, no. 1 (2024): 012077. http://dx.doi.org/10.1088/1742-6596/2728/1/012077.
Full textKhan, Shagufta, and Manoj Saini. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering (IJAPE) 10, no. 4 (2021): 315. http://dx.doi.org/10.11591/ijape.v10.i4.pp315-325.
Full textManoj, Saini, and Khan Shagufta. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering 10, no. 4 (2021): 315~325. https://doi.org/10.5281/zenodo.7344563.
Full textVijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Full textSinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.
Full textShabat, Hafedh Ali, Khamael Raqim Raheem, and Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density." Journal of Image and Graphics 12, no. 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.
Full textSingh, Uday Vikram, Suyash Rastogi, and Asim Ahmed. "Document Tampering Detection: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.
Full textDekate, Sahil, Palkhi Wankhede, Megha Ghosh, Mansi Gotephode, and Bhoomi Gajimwar. "Iot Based Electric Meter Tampering Detector." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3590–92. http://dx.doi.org/10.22214/ijraset.2024.60558.
Full textGanji, Fatemeh, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor, and Damon Woodward. "The Power of IC Reverse Engineering for Hardware Trust and Assurance." EDFA Technical Articles 21, no. 2 (2019): 30–36. http://dx.doi.org/10.31399/asm.edfa.2019-2.p030.
Full textDissertations / Theses on the topic "Power tampering"
Sun, He-Nan, and 孫赫男. "A new reliable Thevenin parameter esitmation method of power grids to resist phasor measurement data tampering and measure the error stochastically." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xx844c.
Full textBook chapters on the topic "Power tampering"
Gaibotti, Adriano, Claudio Marchisio, Alexandro Sentinelli, and Giacomo Boracchi. "Tampering Detection in Low-Power Smart Cameras." In Engineering Applications of Neural Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23983-5_23.
Full textBalasubramanian, Kannan, and M. Rajakani. "Attacks on Implementation of Cryptographic Algorithms." In Algorithmic Strategies for Solving Complex Problems in Cryptography. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2915-6.ch007.
Full textSmuts, R. Malcolm. "King James’s Peace, the Laws of the Realms, and the Forging of a United Kingdom?" In Political Culture, the State, and the Problem of Religious War in Britain and Ireland, 1578-1625. Oxford University PressOxford, 2023. http://dx.doi.org/10.1093/oso/9780192863133.003.0010.
Full textRutherford, Helen, Birju Kotecha, and Angela MacFarlane. "13. The jury." In English Legal System. Oxford University Press, 2022. http://dx.doi.org/10.1093/he/9780192858856.003.0013.
Full textRutherford, Helen, Birju Kotecha, and Angela Macfarlane. "13. The jury." In English Legal System. Oxford University Press, 2024. http://dx.doi.org/10.1093/he/9780198898504.003.0013.
Full textWilson, Steve, Helen Rutherford, Tony Storey, and Natalie Wortley. "10. The jury." In English Legal System. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198808152.003.0010.
Full textWilson, Steve, Helen Rutherford, Tony Storey, Natalie Wortley, and Birju Kotecha. "10. The jury." In English Legal System. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780198853800.003.0010.
Full textRamachandran, M., and G. Prabhakar. "IOT EMPOWERMENT IN SMART GRID TO ENHANCE EFFICIENCY, RELIABILITY, AND SECURITY THROUGH INNOVATIVE APPLICATIONS." In Futuristic Trends in IOT Volume 3 Book 9. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bbio9p9ch2.
Full textSumathi G., Srivani L., Thirugnana Murthy D., Kumar Anish, and Madhusoodanan K. "Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs." In Cryptology and Information Security Series. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-744-3-143.
Full textPatil, Harsha Kundan. "Blockchain Technology-Security Booster." In Blockchain Applications in IoT Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2414-5.ch008.
Full textConference papers on the topic "Power tampering"
Ankilla, Mayank Reddy, Suraj Tirumani, and R. Siva. "Forgery and Tampering Detection for Images Using Deep Learning." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10675216.
Full textLi, Qilin, Hui He, Qiyue Zhou, and Taiting Yu. "Research on Anti-Tampering Method of Convolutional Coding for Power Internet of Things Sensing." In 2024 China International Conference on Electricity Distribution (CICED). IEEE, 2024. http://dx.doi.org/10.1109/ciced63421.2024.10754036.
Full textGeethanjali, T. M., T. S. Darshan, K. Surya, H. U. Rahul, and Ipshika N. Sheety. "Detectify : Image Tampering Detection using Error Level Analysis (ELA) and Convolutional Neural Network (CNN)." In 2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT). IEEE, 2024. http://dx.doi.org/10.1109/iconscept61884.2024.10627878.
Full textIslam, Rifatul, Nafisa Tabassum, Tohidul Islam, Mehedi Hassan, Niloy Goswami, and Abu Hena Shatil. "Design and Development of a Smart Billing Meter for Load Management and Tampering Alerts." In 2024 IEEE International Conference on Power, Electrical, Electronics and Industrial Applications (PEEIACON). IEEE, 2024. https://doi.org/10.1109/peeiacon63629.2024.10800486.
Full textAraujo, Sabryna, Ramille Santana, Joana Silva, et al. "Applying Prototyping and Exploratory Testing to Ensure Software Quality in an Information System for Power Tampering Detection: An Experience Report." In 27th International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013483000003929.
Full textRashid, Anum, Muhammad Naveed Aman, Mukhtar Ullah, and Biplab Sikdar. "Detecting Data Tampering In Synchrophasors Using Power Flow Entropy." In 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia). IEEE, 2018. http://dx.doi.org/10.1109/isgt-asia.2018.8467959.
Full textCalderon, Felix, Juan J. Flores, and Sergio Bravo-Solorio. "Watermarks based on Pyramidal Images for Tampering Image Self-Restoration." In 2022 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC). IEEE, 2022. http://dx.doi.org/10.1109/ropec55836.2022.10018582.
Full textQi, Chengfei, Chaoran Bi, Yan Liu, Tongjia Wei, and Xiaobo Yang. "A Tampering Detection Method for Power Monitoring Data Based on Kalman Filter." In 2023 IEEE International Conference on Image Processing and Computer Applications (ICIPCA). IEEE, 2023. http://dx.doi.org/10.1109/icipca59209.2023.10257846.
Full textChandel, Priyamvada, Tripta Thakur, and B. A. Sawale. "Energy Meter tampering: Major cause of non-technical losses in Indian distribution sector." In 2016 International Conference on Electrical Power and Energy Systems (ICEPES). IEEE, 2016. http://dx.doi.org/10.1109/icepes.2016.7915959.
Full textKorak, Thomas, and Michael Hoefler. "On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms." In 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2014. http://dx.doi.org/10.1109/fdtc.2014.11.
Full text