default search action
Martin Higgins
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Martin Higgins, Bruce Stephen, David Wallom:
Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection. IET Cyper-Phys. Syst.: Theory & Appl. 8(4): 257-271 (2023) - [j6]Martin Higgins, Wangkun Xu, Fei Teng, Thomas Parisini:
Cyber-physical risk assessment for false data injection attacks considering moving target defences. Int. J. Inf. Sec. 22(3): 579-589 (2023) - [j5]Wangkun Xu, Martin Higgins, Jianhong Wang, Imad M. Jaimoukha, Fei Teng:
Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach. IEEE Trans. Smart Grid 14(4): 3176-3188 (2023) - [i7]Martin Higgins, Bruce Stephen, David Wallom:
Incentive-weighted Anomaly Detection for False Data Injection Attacks Against Smart Meter Load Profiles. CoRR abs/2301.10628 (2023) - 2022
- [i6]Martin Higgins, Wangkun Xu, Fei Teng, Thomas Parisini:
Cyber-Physical Risk Assessment for False Data Injection Attacks Considering Moving Target Defences. CoRR abs/2202.10841 (2022) - [i5]Wangkun Xu, Martin Higgins, Jianhong Wang, Imad M. Jaimoukha, Fei Teng:
Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach. CoRR abs/2204.12970 (2022) - [i4]Martin Higgins, Devki Nandan Jha, David Wallom:
Spatial-Temporal Anomaly Detection for Sensor Attacks in Autonomous Vehicles. CoRR abs/2212.07757 (2022) - 2021
- [j4]Martin Higgins, Keith Mayes, Fei Teng:
Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence. IET Cyper-Phys. Syst.: Theory & Appl. 6(1): 12-26 (2021) - [j3]Martin Higgins, Fei Teng, Thomas Parisini:
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems. IEEE Trans. Inf. Forensics Secur. 16: 1275-1287 (2021) - [i3]Martin Higgins, Jiawei Zhang, Ning Zhang, Fei Teng:
Topology Learning Aided False Data Injection Attack without Prior Topology Information. CoRR abs/2102.12248 (2021) - 2020
- [i2]Martin Higgins, Fei Teng, Thomas Parisini:
Stealthy MTD Against Unsupervised Learning-based Blind FDI Attacks in Power Systems. CoRR abs/2004.07004 (2020) - [i1]Martin Higgins, Keith Mayes, Fei Teng:
Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence. CoRR abs/2010.14173 (2020)
2000 – 2009
- 2000
- [j2]Elisabeth Davenport, Martin Higgins, Ian Sommerville:
Narratives of new media in Scottish households: the evolution of a framework of inquiry. J. Am. Soc. Inf. Sci. 51(10): 900-912 (2000) - [j1]Martin Higgins:
Divergent Messages in a Converging World. Inf. Soc. 16(1): 49-63 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint