Journal articles on the topic 'Power tampering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Power tampering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Agarwal, Shubham, and Mayur Agarwal. "Wireless Power Theft Monitoring System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 36–39. http://dx.doi.org/10.51976/ijari.121309.
Full textTan, Huijuan, Wenxin Guo, Shiming Li, Wenjie Zheng, and Qian Li. "Power system topological node tamper detection method based on fuzzy graph theory." Journal of Physics: Conference Series 2728, no. 1 (2024): 012077. http://dx.doi.org/10.1088/1742-6596/2728/1/012077.
Full textKhan, Shagufta, and Manoj Saini. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering (IJAPE) 10, no. 4 (2021): 315. http://dx.doi.org/10.11591/ijape.v10.i4.pp315-325.
Full textManoj, Saini, and Khan Shagufta. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering 10, no. 4 (2021): 315~325. https://doi.org/10.5281/zenodo.7344563.
Full textVijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Full textSinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.
Full textShabat, Hafedh Ali, Khamael Raqim Raheem, and Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density." Journal of Image and Graphics 12, no. 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.
Full textSingh, Uday Vikram, Suyash Rastogi, and Asim Ahmed. "Document Tampering Detection: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.
Full textDekate, Sahil, Palkhi Wankhede, Megha Ghosh, Mansi Gotephode, and Bhoomi Gajimwar. "Iot Based Electric Meter Tampering Detector." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3590–92. http://dx.doi.org/10.22214/ijraset.2024.60558.
Full textGanji, Fatemeh, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor, and Damon Woodward. "The Power of IC Reverse Engineering for Hardware Trust and Assurance." EDFA Technical Articles 21, no. 2 (2019): 30–36. http://dx.doi.org/10.31399/asm.edfa.2019-2.p030.
Full textCRYER, ROBERT. "Witness Tampering and International Criminal Tribunals." Leiden Journal of International Law 27, no. 1 (2014): 191–203. http://dx.doi.org/10.1017/s0922156513000691.
Full textLuo, Bin, Guibin Xu, Jinglong Xie, and Yufei Wang. "A Blockchain-based Security Framework for Secure and Resilient Smart Grid." Journal of Physics: Conference Series 2218, no. 1 (2022): 012033. http://dx.doi.org/10.1088/1742-6596/2218/1/012033.
Full textKhachane, Siddharth, and Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.
Full textZhu, Chaoqun, Jie Li, Jie Shen, et al. "Detection Scheme for Tampering Behavior on Distributed Controller of Electric-Thermal Integrated Energy System Based on Relation Network." Computational Intelligence and Neuroscience 2022 (August 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/9594267.
Full textOnyishi, D. U., O. A. Osahenvemwen, and O. J. Awashare. "Design and simulation of a smart energy metering system." Tropical Journal of Science and Technology 5, no. 1 (2024): 14–28. http://dx.doi.org/10.47524/tjst.v5i1.15.
Full textPing, Guo. "Detection of Power Data Tampering Attack based on Gradient Boosting Decision Tree." Journal of Physics: Conference Series 1846, no. 1 (2021): 012057. http://dx.doi.org/10.1088/1742-6596/1846/1/012057.
Full textPradipkumar, V. Lokhande, S. Deshmukh Sakshi, K. Magdum Sakshi, and R. Shendge Dhanashri. "Combatting Electricity Theft through IoT Integration." Journal of Advancement in Communication System 7, no. 2 (2024): 44–55. https://doi.org/10.5281/zenodo.11159792.
Full textChen, Jinqian, Yong Yan, Shaoyong Guo, Yinlin Ren, and Feng Qi. "A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques." Wireless Communications and Mobile Computing 2022 (January 17, 2022): 1–12. http://dx.doi.org/10.1155/2022/8390241.
Full textHsu, Hsiang-Ping, Zhong-Ren Jiang, Lo-Ya Li, et al. "Detection of Audio Tampering Based on Electric Network Frequency Signal." Sensors 23, no. 16 (2023): 7029. http://dx.doi.org/10.3390/s23167029.
Full textHe, Xudong, Jian Wang, Jiqiang Liu, Enze Yuan, Kailun Wang, and Zhen Han. "Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain." Security and Communication Networks 2021 (October 14, 2021): 1–20. http://dx.doi.org/10.1155/2021/9501572.
Full textAlkatheiri, Mohammed Saeed, Sajid Saleem, Mohammed Ali Alqarni, Ahmad O. Aseeri, Sajjad Hussain Chauhdary, and Yu Zhuang. "A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions." Electronics 11, no. 18 (2022): 2921. http://dx.doi.org/10.3390/electronics11182921.
Full textHaj Ahmad, Hanan, Ehab M. Almetwally, and Dina A. Ramadan. "Competing Risks in Accelerated Life Testing: A Study on Step-Stress Models with Tampered Random Variables." Axioms 14, no. 1 (2025): 32. https://doi.org/10.3390/axioms14010032.
Full textPranau, N., T. Raghuraman, S. V. Vishnuguhan, and Dr B. Meenakshi. "Load Monitoring and Detection of Tampering in Power Lines Using Internet of Things (Iot)." IOSR Journal of Electrical and Electronics Engineering 12, no. 02 (2017): 42–45. http://dx.doi.org/10.9790/1676-1202024245.
Full textYe, Li, Wei Wei, Yingchun Wang, Yue Guo, He Yu, and Yalan Wang. "Research on Data Acquisition Technology of Intelligent Laboratory Based on Retinex-Net Image Recognition." Journal of Physics: Conference Series 2474, no. 1 (2023): 012059. http://dx.doi.org/10.1088/1742-6596/2474/1/012059.
Full textMurugan, A. S. S., Rajib Kumar Kar, M. Rajitha, and N. Karuppiah. "IOT based Smart Unlawful Electricity Usage Surveillance and Warning System." E3S Web of Conferences 472 (2024): 03009. http://dx.doi.org/10.1051/e3sconf/202447203009.
Full textSiddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.
Full textAhmad, Hanan Haj, Dina A. Ramadan, and Ehab M. Almetwally. "Tampered Random Variable Analysis in Step-Stress Testing: Modeling, Inference, and Applications." Mathematics 12, no. 8 (2024): 1248. http://dx.doi.org/10.3390/math12081248.
Full textNaidu, Nalluri Brahma, Thokala Kavyasree, Tadikonda Ravi Teja, Pulimela Sushma Sarayu, and Sivangula Sai. "Image Forgery Detection using ResNet50." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2222–29. http://dx.doi.org/10.22214/ijraset.2024.59317.
Full textRathod, Ghrushnesh, Shubham More, Amit Patil, and Sheetal Ahir. "Logistics & Supply Chain Management Using the Power of Blockchain." ITM Web of Conferences 44 (2022): 03048. http://dx.doi.org/10.1051/itmconf/20224403048.
Full textBhoite, Priyanka Ashok, Dr Yuvraj K. Kanse, and Dr Supriya P. Salave. "IoT-Based Electricity Theft Detection System." International Journal of Innovative Technology and Exploring Engineering 14, no. 7 (2025): 30–35. https://doi.org/10.35940/ijitee.e4661.14070625.
Full textDiahovchenko, Illia, Robert G. Olsen, Viacheslav Zalotov, Anastasiia Chuprun, Bystrík Dolník, and Oleksandr Boiko. "Development of effective shielding against electricity meters tampering with strong magnetic fields." Electric Power Systems Research 213 (December 2022): 108722. http://dx.doi.org/10.1016/j.epsr.2022.108722.
Full textLiu, Yubao, Bocheng Yan, Benrui Wang, Quanchao Sun, and Yinfei Dai. "Computation Offloading Strategy Based on Improved Polar Lights Optimization Algorithm and Blockchain in Internet of Vehicles." Applied Sciences 15, no. 13 (2025): 7341. https://doi.org/10.3390/app15137341.
Full textSoni, Mayank, Nikhil Mandoli, Kunal Gupta, and Ranjeeta Yadav. "Wireless IoT-Based Smart Monitoring System with Power Theft Detection." International Journal of Microsystems and IoT 3, no. 2 (2025): 1539–43. https://doi.org/10.5281/zenodo.15494818.
Full textGuo, Qinglei, Xiukui Pan, Weiqing Zhou, Peng Li, and Qi Li. "Credible calculation method for regional corrected carbon emission factors taking into account the nearby consumption of renewable energy." Journal of Physics: Conference Series 2826, no. 1 (2024): 012004. http://dx.doi.org/10.1088/1742-6596/2826/1/012004.
Full textKook, Sangjin, Keunok Kim, Jihyeon Ryu, Youngsook Lee, and Dongho Won. "Lightweight Hash-Based Authentication Protocol for Smart Grids." Sensors 24, no. 10 (2024): 3085. http://dx.doi.org/10.3390/s24103085.
Full textOh, Se-Chang, Min-Soo Kim, Yoon Park, Gyu-Tak Roh, and Chin-Woo Lee. "Implementation of blockchain-based energy trading system." Asia Pacific Journal of Innovation and Entrepreneurship 11, no. 3 (2017): 322–34. http://dx.doi.org/10.1108/apjie-12-2017-037.
Full textChen Chai Phing, Tiong Sieh Kiong, Siaw Paw Koh, et al. "A Brief Review on Ancillary Services from Advanced Metering Infrastructure (ASAMI) for Distributed Renewable Energy Network." Journal of Advanced Research in Applied Sciences and Engineering Technology 41, no. 2 (2024): 43–61. http://dx.doi.org/10.37934/araset.41.2.4361.
Full textV, Varshad, and Vinay Prasad M. S. "A Web Application for Drug Traceability in Healthcare System using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 544–56. http://dx.doi.org/10.22214/ijraset.2022.46221.
Full textKannan, Raadhesh, and Ji-Jian Chin. "Backup Automation Using Power Automate for Malaysian Vaccination Centres." Journal of Informatics and Web Engineering 1, no. 1 (2022): 23–34. http://dx.doi.org/10.33093/jiwe.2022.1.1.3.
Full textChen, Liudong, Li Ma, Nian Liu, Lingfeng Wang, and Zhaoxi Liu. "Parameter tampering cyberattack and event-trigger detection in game-based interactive demand response." International Journal of Electrical Power & Energy Systems 135 (February 2022): 107550. http://dx.doi.org/10.1016/j.ijepes.2021.107550.
Full textEbrahim A. M. Al-Rawashde, Ebrahim A. M. Al-Rawashde. "Guarantees to protect the worker's wage vis-à-vis the employer in the Arab Charter on Human Rights and Comparative Regulations - The Saudi regime is a model: ضمانات حماية أجر العامل في مواجهة صاحب العمل في الميثاق العربي لحقوق الإنسان والأنظمة المقارنة – النظام السعودي أنموذجاً". مجلة العلوم الإقتصادية و الإدارية و القانونية 5, № 14 (2021): 116–92. http://dx.doi.org/10.26389/ajsrp.r121020.
Full textLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations." Ciencia e Ingeniería Neogranadina 30, no. 1 (2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Full textGunduz, Muhammed Zekeriya, and Resul Das. "Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns." Sensors 24, no. 4 (2024): 1148. http://dx.doi.org/10.3390/s24041148.
Full textRouissat, Mehdi, Mohammed Belkheir, and Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks." Journal of Electrical Engineering 73, no. 4 (2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.
Full textSingh, Suraj. "E-Voting System Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 5515–20. http://dx.doi.org/10.22214/ijraset.2023.53021.
Full textHan, Qi, Yifei Qi, Hua Deng, and Han Liu. "Design and application of distributed photovoltaic transaction consensus mechanism based on blockchain." Journal of Physics: Conference Series 2247, no. 1 (2022): 012040. http://dx.doi.org/10.1088/1742-6596/2247/1/012040.
Full textAbdelrahman, Mahmoud S., Ibtissam Kharchouf, Tung Lam Nguyen, and Osama A. Mohammed. "A Hybrid Physical Co-Simulation Smart Grid Testbed for Testing and Impact Analysis of Cyber-Attacks on Power Systems: Framework and Attack Scenarios." Energies 16, no. 23 (2023): 7771. http://dx.doi.org/10.3390/en16237771.
Full textLago, Federica, Quoc-Tin Phan, and Giulia Boato. "Visual and Textual Analysis for Image Trustworthiness Assessment within Online News." Security and Communication Networks 2019 (April 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/9236910.
Full textNdam Nsangou, Azirilou. "Mirage démocratique et immobilisme politique en Afrique subsaharienne : le cas du Cameroun." Studia Universitatis Babeș-Bolyai Studia Europaea 66, no. 2 (2021): 23–54. http://dx.doi.org/10.24193/subbeuropaea.2021.2.02.
Full textBai, Wei, Lan Xiong, Yubei Liao, Zhengyang Tan, Jingang Wang, and Zhanlong Zhang. "Detection Method for Three-Phase Electricity Theft Based on Multi-Dimensional Feature Extraction." Sensors 24, no. 18 (2024): 6057. http://dx.doi.org/10.3390/s24186057.
Full text