-
1
-
-
18644364822
-
A screening methodology for the identification and ranking of infrastructures vulnerability due to terrorism
-
G. E. Apostolakis and D. M. Lemon, "A screening methodology for the identification and ranking of infrastructures vulnerability due to terrorism," Risk Analysis, vol. 25, no. 1, p. 361, 2005.
-
(2005)
Risk Analysis
, vol.25
, Issue.1
, pp. 361
-
-
Apostolakis, G.E.1
Lemon, D.M.2
-
2
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
V.M. Bier, A. Nagaraj, and V. Abhichandani, "Protection of simple series and parallel systems with components of different values," Reliability Engineering and System Safety, vol. 87, no. 3, p. 315, 2005.
-
(2005)
Reliability Engineering and System Safety
, vol.87
, Issue.3
, pp. 315
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
3
-
-
78650817483
-
Source-sink network protection against diverse interdictor strategy via evolutionary techniques & considering continuous defense efforts
-
J. E. Ramirez-Marquez, C. Rocco, and G. Levitin, "Source-sink network protection against diverse interdictor strategy via evolutionary techniques & considering continuous defense efforts," Reliability Engineering & System Safety, vol. 96, no. 3, p. 374, 2011.
-
(2011)
Reliability Engineering & System Safety
, vol.96
, Issue.3
, pp. 374
-
-
Ramirez-Marquez, J.E.1
Rocco, C.2
Levitin, G.3
-
4
-
-
20144382380
-
Survivability of series-parallel systems with multilevel protection
-
E. Korczak, G. Levitin, and H. Ben-Haim, "Survivability of series-parallel systems with multilevel protection," Reliability Engineering and System Safety, vol. 90, no. 1, p. 45, 2007.
-
(2007)
Reliability Engineering and System Safety
, vol.90
, Issue.1
, pp. 45
-
-
Korczak, E.1
Levitin, G.2
Ben-Haim, H.3
-
5
-
-
34047142655
-
Optimal defense strategy against intentional attacks
-
G. Levitin, "Optimal defense strategy against intentional attacks," IEEE Transactions on Reliability, vol. 56, no. 1, p. 148, 2007.
-
(2007)
IEEE Transactions on Reliability
, vol.56
, Issue.1
, pp. 148
-
-
Levitin, G.1
-
6
-
-
36849025453
-
Importance of protections against intentional attacks
-
G. Levitin and H. Ben-Haim, "Importance of protections against intentional attacks," Reliability Engineering and System Safety, vol. 93, no. 4, p. 639, 2007.
-
(2007)
Reliability Engineering and System Safety
, vol.93
, Issue.4
, pp. 639
-
-
Levitin, G.1
Ben-Haim, H.2
-
7
-
-
43249094557
-
Protection vs. redundancy in homogeneous parallel systems
-
G. Levitin and K. Hausken, "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, vol. 93, no. 10, p. 1444, 2007.
-
(2007)
Reliability Engineering and System Safety
, vol.93
, Issue.10
, pp. 1444
-
-
Levitin, G.1
Hausken, K.2
-
8
-
-
0036089074
-
The role of risk analysis in the protection of critical infrastructures against terrorism
-
Y. Haimes and T. Longstaff, "The role of risk analysis in the protection of critical infrastructures against terrorism," Risk Analysis, vol. 22, no. 3, p. 439, 2002.
-
(2002)
Risk Analysis
, vol.22
, Issue.3
, pp. 439
-
-
Haimes, Y.1
Longstaff, T.2
-
9
-
-
56149088059
-
Protecting infrastructures from strategic attackers
-
Specialisation Topics Taylor & Francis ISBN: 978-0-415-44783-6
-
K. Hausken, "Protecting infrastructures from strategic attackers," in Risk, Reliability and Societal Safety, 2007, vol. 1, Specialisation Topics, Taylor & Francis, p. 881, ISBN: 978-0-415-44783-6.
-
(2007)
Risk, Reliability and Societal Safety
, vol.1
, pp. 881
-
-
Hausken, K.1
-
10
-
-
33745256769
-
Reduction of physical threats to water distribution systems
-
Z. Skolicki, M. Wadda, M. Houck, and T. Arciszewski, "Reduction of physical threats to water distribution systems," Journal of Water Resources Planning and Management, Special Issue: DrinkingWater Systems Security, vol. 132, no. 4, p. 211, 2006.
-
(2006)
Journal of Water Resources Planning and Management, Special Issue: DrinkingWater Systems Security
, vol.132
, Issue.4
, pp. 211
-
-
Skolicki, Z.1
Wadda, M.2
Houck, M.3
Arciszewski, T.4
-
11
-
-
37849000310
-
Generation of terrorist scenarios for water distribution systems: An evolutionary computation approach
-
T., George Mason University
-
M. Wadda, Z. Skolicki, and T. Arciszewski, "Generation of terrorist scenarios for water distribution systems: an evolutionary computation approach," in Proceedings of the workshop "Critical Infrastructure Protection Project, 2004, p. 162, T., George Mason University.
-
(2004)
Proceedings of the Workshop "critical Infrastructure Protection Project
, pp. 162
-
-
Wadda, M.1
Skolicki, Z.2
Arciszewski, T.3
-
12
-
-
33947365606
-
Evaluating strategies for defending electric power networks against antagonistic attacks
-
A. Holmgren, E. Jenelius, and J.Westin, "Evaluating strategies for defending electric power networks against antagonistic attacks," IEEE Transactions on Power Systems, vol. 22, no. 1, p. 76, 2006.
-
(2006)
IEEE Transactions on Power Systems
, vol.22
, Issue.1
, pp. 76
-
-
Holmgren, A.1
Jenelius, E.2
Westin, J.3
-
13
-
-
33748439665
-
Using graph models to analyze the vulnerability of electric power networks
-
A. Holmgren, "Using graph models to analyze the vulnerability of electric power networks," Risk Analysis, vol. 26, no. 4, p. 955, 2006.
-
(2006)
Risk Analysis
, vol.26
, Issue.4
, pp. 955
-
-
Holmgren, A.1
-
14
-
-
33847391280
-
Understanding the interaction between public policy, managerial decision-making and the engineering of critical infrastructures
-
C. Johnson, "Understanding the interaction between public policy, managerial decision-making and the engineering of critical infrastructures, " Reliability Engineering and System Safety, vol. 92, no. 9, p. 1141, 2007.
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1141
-
-
Johnson, C.1
-
18
-
-
0034138347
-
State extension for adequacy evaluation of composite power systems-applications
-
R. Billinton and W. Zhang, "State extension for adequacy evaluation of composite power systems-applications," IEEE Transactions on Power Systems, vol. 15, no. 1, p. 427, 2000.
-
(2000)
IEEE Transactions on Power Systems
, vol.15
, Issue.1
, pp. 427
-
-
Billinton, R.1
Zhang, W.2
-
19
-
-
0031258420
-
Structure optimization of power system with different redundant elements
-
G. Levitin, A. Lisnianski, and D. Elmakis, "Structure optimization of power system with different redundant elements," Electric Power Systems Research, vol. 43, p. 19, 1997.
-
(1997)
Electric Power Systems Research
, vol.43
, pp. 19
-
-
Levitin, G.1
Lisnianski, A.2
Elmakis, D.3
-
20
-
-
79958009288
-
Increasing infrastructure resilience through competitive coevolution
-
S. Travis and D. Tauritz, "Increasing infrastructure resilience through competitive coevolution," New Mathematics and Natural Computation, vol. 5, no. 2, p. 441, 2009.
-
(2009)
New Mathematics and Natural Computation
, vol.5
, Issue.2
, pp. 441
-
-
Travis, S.1
Tauritz, D.2
-
22
-
-
33845308567
-
Identification of severe multiple contingencies in electric power networks
-
Ames, IN October
-
V. Donde, V. Lopez, B. C. Lesieutre, A. Pinar, C. Yang, and J. Meza, "Identification of severe multiple contingencies in electric power networks," in Proceedings of the North American Power Symposium, Ames, IN, October 2005.
-
(2005)
Proceedings of the North American Power Symposium
-
-
Donde, V.1
Lopez, V.2
Lesieutre, B.C.3
Pinar, A.4
Yang, C.5
Meza, J.6
-
23
-
-
43849089098
-
Severe multiple contingencies screening in electric power systems
-
V. Lopez, B. C. Lesieutre, A. Pinar, C. Yang, and J. Meza, "Severe multiple contingencies screening in electric power systems," IEEE Transactions on Power Systems, vol. 23, no. 2, p. 406, 2008.
-
(2008)
IEEE Transactions on Power Systems
, vol.23
, Issue.2
, pp. 406
-
-
Lopez, V.1
Lesieutre, B.C.2
Pinar, A.3
Yang, C.4
Meza, J.5
-
24
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
J. Salmerón, K. Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Transactions on Power Systems, vol. 19, no. 2, p. 905, 2004.
-
(2004)
IEEE Transactions on Power Systems
, vol.19
, Issue.2
, pp. 905
-
-
Salmerón, J.1
Wood, K.2
Baldick, R.3
-
26
-
-
79952959479
-
An interdiction model of highway transportationRAND Research Memorandum
-
E. Durbin, An interdiction model of highway transportationRAND Research Memorandum, RM-4945-PR, 1966.
-
(1966)
RM-4945-PR
-
-
Durbin, E.1
-
29
-
-
79957996930
-
Partial Enumeration for Planar Network Interdiction Problems
-
Naval Postgraduate School
-
M. Boyle, "Partial Enumeration for Planar Network Interdiction Problems," Master of Science Dissertation Thesis, Naval Postgraduate School, 1988.
-
(1988)
Master of Science Dissertation Thesis
-
-
Boyle, M.1
-
30
-
-
38249007197
-
Deterministic network interdiction
-
K. Wood, "Deterministic network interdiction," Mathematical and Computer Modeling, vol. 17, p. 1, 1993.
-
(1993)
Mathematical and Computer Modeling
, vol.17
, pp. 1
-
-
Wood, K.1
-
32
-
-
54149090598
-
Deterministic network interdiction optimization via an evolutionary approach
-
C. Rocco and J. E. Ramirez-Marquez, "Deterministic network interdiction optimization via an evolutionary approach," Reliability Engineering and System Safety, vol. 94, no. 2, p. 568, 2009.
-
(2009)
Reliability Engineering and System Safety
, vol.94
, Issue.2
, pp. 568
-
-
Rocco, C.1
Ramirez-Marquez, J.E.2
-
33
-
-
79958009778
-
-
Monterey, CA Technical Report NPS-OR-03-002
-
J. Salmerón, K. Wood, and R. Baldick, Optimizing Electric Grid Design Under Asymmetric Threat Naval Postgraduate School, Monterey, CA, Technical Report, NPS-OR-03-002, 2003.
-
(2003)
Optimizing Electric Grid Design under Asymmetric Threat Naval Postgraduate School
-
-
Salmerón, J.1
Wood, K.2
Baldick, R.3
-
34
-
-
18944397931
-
Interdicting electrical power grids
-
Naval Postgraduate School, Monterey, CA
-
R. Álvarez, "Interdicting Electrical Power Grids," Master of Science Dissertation Thesis, Naval Postgraduate School, Monterey, CA, 2004.
-
(2004)
Master of Science Dissertation Thesis
-
-
Álvarez, R.1
-
35
-
-
79957988875
-
-
Monterey, CA, Technical Report. NPS-OR-04-001
-
J. Salmerón, K. Wood, and R. Baldick, Optimizing electric grid design under asymmetric threat (II) Naval Postgraduate School, Monterey, CA, Technical Report. NPS-OR-04-001, 2004.
-
(2004)
Optimizing Electric Grid Design under Asymmetric Threat (II) Naval Postgraduate School
-
-
Salmerón, J.1
Wood, K.2
Baldick, R.3
-
36
-
-
18944385541
-
On the solution of the bilevel programming formulation of the terrorist threat problem
-
J. Arroyo and F. Galiana, "On the solution of the bilevel programming formulation of the terrorist threat problem," IEEE Transactions on Power Systems, vol. 20, no. 2, p. 789, 2005.
-
(2005)
IEEE Transactions on Power Systems
, vol.20
, Issue.2
, pp. 789
-
-
Arroyo, J.1
Galiana, F.2
-
37
-
-
23144435998
-
A necessary condition of power Jacobian singularity based on branch complex flows
-
S. Grjialva and P. W. Sauer, "A necessary condition of power Jacobian singularity based on branch complex flows," IEEE Transactions on Circuits and Systems-I, vol. 52, no. 7, p. 1406, 2005.
-
(2005)
IEEE Transactions on Circuits and Systems-I
, vol.52
, Issue.7
, pp. 1406
-
-
Grjialva, S.1
Sauer, P.W.2
-
39
-
-
43849097669
-
-
New York: Springer
-
T. He, S. Kolluri, S. Mandal, F. Galvan, and P. Rastgoufard, Applied Mathematics for Restructured Power Systems: Optimization, Control, and Computational Intelligence. New York: Springer, 2005.
-
(2005)
Applied Mathematics for Restructured Power Systems: Optimization Control and Computational Intelligence
-
-
He, T.1
Kolluri, S.2
Mandal, S.3
Galvan, F.4
Rastgoufard, P.5
-
40
-
-
0030081868
-
Genetic algorithm-based method for contingency screening in power systems
-
H. Saitoh, Y. Takano, and J. Toyoda, "Genetic algorithm-based method for contingency screening in power systems," Electrical Engineering in Japan, vol. 116, no. 2, p. 99.
-
Electrical Engineering in Japan
, vol.116
, Issue.2
, pp. 99
-
-
Saitoh, H.1
Takano, Y.2
Toyoda, J.3
-
43
-
-
0004116989
-
-
ed. Cambridge MA: MIT Press
-
T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms, Second Edition ed. Cambridge, MA: MIT Press, 2001.
-
(2001)
Introduction to Algorithms Second Edition
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
44
-
-
77953866273
-
Influence of the topology on the power flux of the Italian high-voltage electrical network
-
in press
-
V. Rosato, L. Issacharoff, and S. Bologna, "Influence of the topology on the power flux of the Italian high-voltage electrical network," Europhysics Letters, 2010, (in press).
-
(2010)
Europhysics Letters
-
-
Rosato, V.1
Issacharoff, L.2
Bologna, S.3
-
45
-
-
33845287589
-
The maximum flow algorithm applied to the placement and distributed steadystate control of facts devices
-
A. Armbruster, M. Gosnell, B. Mcmillinand, and M. Crow, "The maximum flow algorithm applied to the placement and distributed steadystate control of facts devices," in Proceedings of the 37th Annual North American Power Symposium, 2005, p. 77.
-
(2005)
Proceedings of the 37th Annual North American Power Symposium
, pp. 77
-
-
Armbruster, A.1
Gosnell, M.2
McMillinand, B.3
Crow, M.4
-
47
-
-
48449100005
-
Power system extreme event screening using graph partitioning
-
September
-
B. Lesieutre, S. Roy, V. Donde, and A. Pinar, "Power system extreme event screening using graph partitioning," in Proceedings of the North American Power Symposium, Carbondale, Illinois, September 2006.
-
(2006)
Proceedings of the North American Power Symposium, Carbondale, Illinois
-
-
Lesieutre, B.1
Roy, S.2
Donde, V.3
Pinar, A.4
-
48
-
-
62349137043
-
Evolutionary multi-objective optimization: Some current research trends and topics that remain to be explored
-
C. Coello, "Evolutionary multi-objective optimization: some current research trends and topics that remain to be explored," Frontiers of Computer Science in China, vol. 3, no. 1, p. 18, 2009.
-
(2009)
Frontiers of Computer Science in China
, vol.3
, Issue.1
, pp. 18
-
-
Coello, C.1
-
49
-
-
2942547409
-
SPEA2: Improving the strength pareto evolutionary algorithm
-
Athens, Greece
-
E. Zitzler, M. Laumanns, and L. Thiele, "SPEA2: Improving the strength pareto evolutionary algorithm," in Proceedings of Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems, Athens, Greece, 2001, p. 95.
-
(2001)
Proceedings of Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems
, pp. 95
-
-
Zitzler, E.1
Laumanns, M.2
Thiele, L.3
-
50
-
-
0005871804
-
PESA-II: Regionbased selection in evolutionary multiobjective optimization
-
D. Corne, N. Jerram, J. Knowles, and M. Oates, "PESA-II: Regionbased Selection in Evolutionary Multiobjective Optimization," Proceedings of the Genetic and Evolutionary Computation Conference, p. 283, 2001.
-
(2001)
Proceedings of the Genetic and Evolutionary Computation Conference
, pp. 283
-
-
Corne, D.1
Jerram, N.2
Knowles, J.3
Oates, M.4
-
51
-
-
0036530772
-
A fast and elitist multiobjective genetic algorithm: NSGA-II
-
K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, "A fast and elitist multiobjective genetic algorithm: NSGA-II," IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, p. 182, 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.2
, pp. 182
-
-
Deb, K.1
Pratap, A.2
Agarwal, S.3
Meyarivan, T.4
-
52
-
-
33644978280
-
Evolutionary multiobjective optimization: A historical view of the field
-
C. Coello, "Evolutionary multiobjective optimization: A historical view of the field," IEEE Computational Intelligence Magazine, vol. 1, no. 1, p. 28, 2006.
-
(2006)
IEEE Computational Intelligence Magazine
, vol.1
, Issue.1
, pp. 28
-
-
Coello, C.1
-
53
-
-
70349147425
-
Multiple-objective deterministic network interdiction using evolutionary algorithms
-
C. Rocco, D. Salazar, and J. E. Ramirez-Marquez, "Multiple-objective deterministic network interdiction using evolutionary algorithms," in Proceeding of the Annual Reliability and Maintainability Symposium, Forth Worth, Texas, 2009.
-
(2009)
Proceeding of the Annual Reliability and Maintainability Symposium, Forth Worth, Texas
-
-
Rocco, C.1
Salazar, D.2
Ramirez-Marquez, J.E.3
-
54
-
-
79957995846
-
A multiple-objective approach for the vulnerability assessment of infrastructure networks
-
Prague, Czech Republic
-
C. Rocco, J. E. Ramirez-Marquez, and D. Salazar, "A multiple-objective approach for the vulnerability assessment of infrastructure networks," in Proceedings of the European Safety and Reliability Conference, Prague, Czech Republic, 2009.
-
(2009)
Proceedings of the European Safety and Reliability Conference
-
-
Rocco, C.1
Ramirez-Marquez, J.E.2
Salazar, D.3
-
55
-
-
79251610757
-
Bi and tri-objective optimization in the deterministic network interdiction problem
-
C. Rocco, J. E. Ramirez-Marquez, and D. Salazar, "Bi and tri-objective optimization in the deterministic network interdiction problem," Reliability Engineering & System Safety, vol. 95, no. 8, p. 887, 2010.
-
(2010)
Reliability Engineering & System Safety
, vol.95
, Issue.8
, pp. 887
-
-
Rocco, C.1
Ramirez-Marquez, J.E.2
Salazar, D.3
-
56
-
-
33748744238
-
Topological properties of high-voltage electrical transmission networks
-
V. Rosato, S. Bologna, and F. Tiriticco, "Topological properties of high-voltage electrical transmission networks," Electric Power Systems Research, vol. 77, no. 2, p. 99, 2007.
-
(2007)
Electric Power Systems Research
, vol.77
, Issue.2
, pp. 99
-
-
Rosato, V.1
Bologna, S.2
Tiriticco, F.3
-
57
-
-
60549112826
-
Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery
-
J. E. Ramirez-Marquez and C. Rocco, "Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery," Reliability Engineering and System Safety, vol. 94, no. 5, p. 913, 2009.
-
(2009)
Reliability Engineering and System Safety
, vol.94
, Issue.5
, pp. 913
-
-
Ramirez-Marquez, J.E.1
Rocco, C.2
-
58
-
-
77952241821
-
Multi-objective redundancy allocation optimization using a variable neighborhood search algorithm
-
DOI 10.1007/s10732-009-9108-4
-
Y. Liang and M. Lo, "Multi-objective redundancy allocation optimization using a variable neighborhood search algorithm," Journal of Heuristics, DOI 10.1007/s10732-009-9108-4.
-
Journal of Heuristics
-
-
Liang, Y.1
Lo, M.2
-
59
-
-
38049129816
-
Vulnerability assessment of power system using radial basis function neural network and a new feature extraction method
-
A. Haidar, A. Mohamed, and A. Hussain, "Vulnerability assessment of power system using radial basis function neural network and a new feature extraction method," American Journal of Applied Sciences, vol. 5, no. 6, p. 705, 2008.
-
(2008)
American Journal of Applied Sciences
, vol.5
, Issue.6
, pp. 705
-
-
Haidar, A.1
Mohamed, A.2
Hussain, A.3
|