-
1
-
-
49249110834
-
Collaborative, trust-based security mechanisms for a regional utility intranet
-
Aug.
-
G. M. Coates et al., "Collaborative, trust-based security mechanisms for a regional utility intranet," IEEE Trans. Power Syst., vol. 23, pp. 831-844, Aug. 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, pp. 831-844
-
-
Coates, G.M.1
-
2
-
-
78650055631
-
Agent technology applied to the protection of power systems
-
presented at the, Grenoble, France
-
J. S. Thorp et al., "Agent technology applied to the protection of power systems," presented at the Securing Critical Infrastructures, Grenoble, France, 2004.
-
(2004)
Securing Critical Infrastructures
-
-
Thorp, J.S.1
-
3
-
-
79957758243
-
-
Final report on the August 14, 2003 blackout in the United States and Canada: Causes and recommendations U.S.-Canada Power System Outage Task Force, Apr. 5, 2004
-
Final report on the August 14, 2003 blackout in the United States and Canada: Causes and recommendations U.S.-Canada Power System Outage Task Force, Apr. 5, 2004.
-
-
-
-
6
-
-
34748916522
-
Developing an agent-based backup protection system for transmission networks
-
presented at the, Future, Beijing, China
-
X. R. Wang et al., "Developing an agent-based backup protection system for transmission networks," presented at the Conf. Power Syst. Commun. Syst. Infrastruct. Future, Beijing, China, 2002.
-
(2002)
Conf. Power Syst. Commun. Syst. Infrastruct.
-
-
Wang, X.R.1
-
7
-
-
33745612960
-
A primary and backup cooperative protection system based on wide area agents
-
DOI 10.1109/TPWRD.2006.876984
-
R. Giovanini et al., "A primary and backup cooperative protection system based on wide area agents," IEEE Trans. Power Del., vol. 21, pp. 1222-1230, Jul. 2006. (Pubitemid 43983644)
-
(2006)
IEEE Transactions on Power Delivery
, vol.21
, Issue.3
, pp. 1222-1230
-
-
Giovanini, R.1
Hopkinson, K.2
Coury, D.V.3
Thorp, J.S.4
-
8
-
-
59649099905
-
Multiagents-based wide area protection with best-effort adaptive strategy
-
Feb.-Mar.
-
Y. Zhu et al., "Multiagents-based wide area protection with best-effort adaptive strategy," Int. J. Elect. Power Energy Syst., vol. 31, pp. 94-99, Feb.-Mar. 2009.
-
(2009)
Int. J. Elect. Power Energy Syst.
, vol.31
, pp. 94-99
-
-
Zhu, Y.1
-
9
-
-
34548304096
-
Adaptive relays for overhead line protection
-
DOI 10.1016/j.epsr.2006.11.001, PII S0378779606002744
-
V. Calderaro et al., "Adaptive relays for overhead line protection," Elsevier Elect. Power Syst. Res., vol. 77, pp. 1552-1559, 2007. (Pubitemid 47348210)
-
(2007)
Electric Power Systems Research
, vol.77
, Issue.12
, pp. 1552-1559
-
-
Calderaro, V.1
Galdi, V.2
Piccolo, A.3
Siano, P.4
-
10
-
-
0001698236
-
Cooperation and trust: Some theoretical notes
-
Lincoln, NE
-
M. Deutsch, "Cooperation and trust: Some theoretical notes," in Proc. Nebraska Symp. Motivation, Lincoln, NE, 1962, pp. 275-319.
-
(1962)
Proc. Nebraska Symp. Motivation
, pp. 275-319
-
-
Deutsch, M.1
-
11
-
-
70450214119
-
An ontology of trust - Formal semantics and transitivity
-
DOI 10.1145/1151454.1151499, Proc. of the 8th Int. Conf. on Electronic Commerce 2006 - The New E-Commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet
-
J. Huang and M. S. Fox, "An ontology of trust: Formal semantics and transitivity," in Proc. 8th Int. Conf. Electron. Commerce (ICEC), Fredericton, NB, Canada, 2006, pp. 259-270. (Pubitemid 47140666)
-
(2006)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 259-270
-
-
Huang, J.1
Fox, M.S.2
-
14
-
-
0003839495
-
-
Ph.D dissertation, Dept. Comput. Sci. Math., Univ. Stirling, Stirling, U.K.
-
S. P. Marsh, "Formalising trust as a computational concept," Ph.D dissertation, Dept. Comput. Sci. Math., Univ. Stirling, Stirling, U.K., 1994.
-
(1994)
Formalising Trust as a Computational Concept
-
-
Marsh, S.P.1
-
15
-
-
4544375031
-
Trust in multi-agent systems
-
DOI 10.1017/S0269888904000116
-
S. D. Ramchurn et al., "Trust in multi-agent systems," Knowl. Eng. Rev., vol. 19, pp. 1-25, 2004. (Pubitemid 40672198)
-
(2004)
Knowledge Engineering Review
, vol.19
, Issue.1
, pp. 1-25
-
-
Ramchurn, S.D.1
Huynh, D.2
Jennings, N.R.3
-
17
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
May
-
S. Ganeriwal et al., "Reputation-based framework for high integrity sensor networks," ACM Trans. Sensor Netw., vol. 4, pp. 1-37, May 2008.
-
(2008)
ACM Trans. Sensor Netw.
, vol.4
, pp. 1-37
-
-
Ganeriwal, S.1
-
18
-
-
84891389311
-
Trust and reliance in multi-agent systems: A preliminary report
-
S. Martino al Cimino, Ed., Italy
-
S. Marsh and F. La, "Trust and reliance in multi-agent systems: A preliminary report," in Proc. 4th Eur. Workshop Modeling Autonomous Agents Multi-Agent World, S. Martino al Cimino, Ed., Italy, 1992.
-
(1992)
Proc. 4th Eur. Workshop Modeling Autonomous Agents Multi-Agent World
-
-
Marsh, S.1
La, F.2
-
19
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA
-
M. Blaze et al., "Decentralized trust management," in Proc. IEEE Symp. Security Privacy, Oakland, CA, 1996, pp. 164-173.
-
(1996)
Proc. IEEE Symp. Security Privacy
, pp. 164-173
-
-
Blaze, M.1
-
20
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
Lausanne, Switzerland
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol," in Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), Lausanne, Switzerland, 2002, pp. 226-236.
-
(2002)
Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc)
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
21
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
Budapest, Hungary
-
S. D. Kamvar et al., "The eigentrust algorithm for reputation management in P2P networks," in Proc. 12th Int.WorldWideWeb Conf. (WWW 2003), Budapest, Hungary, 2003, pp. 640-651.
-
(2003)
Proc. 12th Int.WorldWideWeb Conf. (WWW 2003)
, pp. 640-651
-
-
Kamvar, S.D.1
-
22
-
-
0043016341
-
Cooperative peer groups in nice
-
San Francisco, CA, USA
-
S. Lee et al., "Cooperative peer groups in nice," in Proc. 22nd Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), San Francisco, CA, USA, 2003, pp. 1272-1282.
-
(2003)
Proc. 22nd Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM)
, pp. 1272-1282
-
-
Lee, S.1
-
25
-
-
79957674345
-
-
[Online]. Available
-
S. Lee, Nice Project Simulation Code Nov. 15, 2010 [Online]. Available: http://www.cs.umd.edu/̃slee/code/prm-simulation.tgz, 2006
-
(2006)
Nice Project Simulation Code Nov.
, vol.15
, pp. 2010
-
-
Lee, S.1
-
27
-
-
33646340926
-
EPOCHS: A platform for agent-based electric power and communication simulation built from commercial off-theshelf components
-
May
-
K. Hopkinson et al., "EPOCHS: A platform for agent-based electric power and communication simulation built from commercial off-theshelf components," IEEE Trans. Power Syst., vol. 21, pp. 548-558, May 2006.
-
(2006)
IEEE Trans. Power Syst.
, vol.21
, pp. 548-558
-
-
Hopkinson, K.1
-
28
-
-
79957699882
-
-
PSCAD/EMTDC Manual Getting Started, Manitoba HVDC Research Centre. Winnipeg, MB, Canada, 2005
-
PSCAD/EMTDC Manual Getting Started, Manitoba HVDC Research Centre. Winnipeg, MB, Canada, 2005,.
-
-
-
-
29
-
-
0034188591
-
Advances in network simulation
-
May
-
L. Breslau et al., "Advances in network simulation," IEEE Comput., vol. 33, pp. 59-67, May 2000.
-
(2000)
IEEE Comput.
, vol.33
, pp. 59-67
-
-
Breslau, L.1
-
30
-
-
0030189082
-
Expose hidden failures to prevent cascading outages
-
Jul.
-
A. G. Phadke and J. S. Thorp, "Expose hidden failures to prevent cascading outages," IEEE Comput. Appl. Power, vol. 9, no. 3, pp. 20-24, Jul. 1996.
-
(1996)
IEEE Comput. Appl. Power
, vol.9
, Issue.3
, pp. 20-24
-
-
Phadke, A.G.1
Thorp, J.S.2
-
31
-
-
79957772507
-
Cyber war: Sabotaging the system
-
Nov. 8, [Online]. Available
-
S. Kroft, "Cyber war: Sabotaging the system," 60 Minutes Nov. 8, 2009 [Online]. Available: http://www.cbsnews.com/stories/ 2009/11/06/60minutes/main5555565.shtml
-
(2009)
60 Minutes
-
-
Kroft, S.1
|