-
1
-
-
56749131687
-
-
A preliminary road map for future research, a coordination action on ICT vulnerabilities of power systems and the relevant defense methodologies, GRID Consortium
-
A preliminary road map for future research - a coordination action on ICT vulnerabilities of power systems and the relevant defense methodologies, GRID Consortium, http://grid.jrc.it
-
-
-
-
2
-
-
33947365606
-
Evaluating strategies for defending electric power networks against antagonistic attacks
-
Holmgren AJ, Jenelius E, Westin J. Evaluating strategies for defending electric power networks against antagonistic attacks. IEEE Transactions on Power Systems 2007; 22(1):76-84.
-
(2007)
IEEE Transactions on Power Systems
, vol.22
, Issue.1
, pp. 76-84
-
-
Holmgren, A.J.1
Jenelius, E.2
Westin, J.3
-
4
-
-
24944442583
-
A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat
-
Motto AL, Arroyo JM, Galiana FD. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat. IEEE Transactions On Power Systems 2005; 20(3):1357-1365.
-
(2005)
IEEE Transactions On Power Systems
, vol.20
, Issue.3
, pp. 1357-1365
-
-
Motto, A.L.1
Arroyo, J.M.2
Galiana, F.D.3
-
5
-
-
18944385541
-
On the solution of the bilevel programming formulation of the terrorist threat problem
-
Arroyo JM, Galiana FD. On the solution of the bilevel programming formulation of the terrorist threat problem. IEEE Transactions On Power Systems 2005; 20(2):789-797.
-
(2005)
IEEE Transactions On Power Systems
, vol.20
, Issue.2
, pp. 789-797
-
-
Arroyo, J.M.1
Galiana, F.D.2
-
6
-
-
35348812520
-
-
Anjia M, Jiaxi Y, Zhizhong G. Electric power grid structural vulnerability assessment. IEEE Power Engineering Society General Meeting 2006, 18-22 June 2006; 6.
-
Anjia M, Jiaxi Y, Zhizhong G. Electric power grid structural vulnerability assessment. IEEE Power Engineering Society General Meeting 2006, 18-22 June 2006; 6.
-
-
-
-
8
-
-
9244246297
-
A practical approach for integrated power system vulnerability analysis with protection failures
-
Yu X, Singh C. A practical approach for integrated power system vulnerability analysis with protection failures. IEEE Transactions On Power Systems 2004; 19(4):1811-1820.
-
(2004)
IEEE Transactions On Power Systems
, vol.19
, Issue.4
, pp. 1811-1820
-
-
Yu, X.1
Singh, C.2
-
9
-
-
28244460605
-
-
Union for the Co-ordination of Transmission of Electricity, Online, Available
-
Operation Handbook. Union for the Co-ordination of Transmission of Electricity. [Online]. Available: http://www.ucte.org
-
Operation Handbook
-
-
-
10
-
-
33846957754
-
Multi-agent models for consumer choice and retailer strategies in the competitive electricity market
-
Article
-
Bompard E, Abrate G, Napoli R, Wan B. Multi-agent models for consumer choice and retailer strategies in the competitive electricity market. International Journal of Emerging Electric Power Systems 8(2): Article 4.
-
International Journal of Emerging Electric Power Systems
, vol.8
, Issue.2
, pp. 4
-
-
Bompard, E.1
Abrate, G.2
Napoli, R.3
Wan, B.4
-
13
-
-
0037843110
-
A multiagent architecture for protection engineering diagnostic assistance
-
Hossack JA, Menai J, McArthur SDJ, McDonald JR. A multiagent architecture for protection engineering diagnostic assistance. IEEE Transactions on Power Systems 2003; 18(2):639-647.
-
(2003)
IEEE Transactions on Power Systems
, vol.18
, Issue.2
, pp. 639-647
-
-
Hossack, J.A.1
Menai, J.2
McArthur, S.D.J.3
McDonald, J.R.4
-
14
-
-
33745612960
-
A primary and backup cooperative protection system based on wide area agents
-
Giovanini R, Hopkinson K, Coury DV, Thorp JS. A primary and backup cooperative protection system based on wide area agents. IEEE Transactions on Power Delivery 2006; 21(3): 1222-1230.
-
(2006)
IEEE Transactions on Power Delivery
, vol.21
, Issue.3
, pp. 1222-1230
-
-
Giovanini, R.1
Hopkinson, K.2
Coury, D.V.3
Thorp, J.S.4
-
15
-
-
0028425226
-
A multi-agent technique for contingency constrained optimal power flows
-
TaluMar S, Ramesh VC. A multi-agent technique for contingency constrained optimal power flows. IEEE Transactions on Power Systems 1994; 9(2):855-861.
-
(1994)
IEEE Transactions on Power Systems
, vol.9
, Issue.2
, pp. 855-861
-
-
TaluMar, S.1
Ramesh, V.C.2
-
16
-
-
0036699876
-
Dynamic security border identification using enhanced particle swarm optimization
-
Kassabalidis IN, El-Sharkawi MA, Marks RJ, Moulin LS, Alves da Silva AP. Dynamic security border identification using enhanced particle swarm optimization. IEEE Transactions on Power Systems 2002; 17(3):723-729.
-
(2002)
IEEE Transactions on Power Systems
, vol.17
, Issue.3
, pp. 723-729
-
-
Kassabalidis, I.N.1
El-Sharkawi, M.A.2
Marks, R.J.3
Moulin, L.S.4
Alves da Silva, A.P.5
-
18
-
-
56749163254
-
-
Bompard E, Gao C, Masera M, et al. Approaches to the Security Analysis of Power Systems: Defence Strategies Against Malicious Threats. Office for Official Publications of the European Communities: Luxembourg, 2007; EUR 22683 EN, ISSN 1018-5593.
-
Bompard E, Gao C, Masera M, et al. Approaches to the Security Analysis of Power Systems: Defence Strategies Against Malicious Threats. Office for Official Publications of the European Communities: Luxembourg, 2007; EUR 22683 EN, ISSN 1018-5593.
-
-
-
-
19
-
-
56749104175
-
The analysis of malicious threats to infrastructures: A conceptual approach based on multi-agent systems
-
Dartmouth College, Hanover, New Hampshire, USA, 19-21 March
-
Bompard E, Napoli R, Russo A, Xue F, Masera M, Stefanini A. The analysis of malicious threats to infrastructures: a conceptual approach based on multi-agent systems. First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, 19-21 March 2007.
-
(2007)
First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection
-
-
Bompard, E.1
Napoli, R.2
Russo, A.3
Xue, F.4
Masera, M.5
Stefanini, A.6
-
22
-
-
0029724518
-
Social learning in a society of decentralized agents. Evolutionary computation
-
Namatame A. Social learning in a society of decentralized agents. Evolutionary computation. Proceedings of IEEE International Conference, 1996.
-
(1996)
Proceedings of IEEE International Conference
-
-
Namatame, A.1
-
26
-
-
16244381482
-
Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
-
Shamma JS, Arslan G. Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria. IEEE Transactions on Automatic Control 2005; 50(3):312-327.
-
(2005)
IEEE Transactions on Automatic Control
, vol.50
, Issue.3
, pp. 312-327
-
-
Shamma, J.S.1
Arslan, G.2
|