-
1
-
-
0030126334
-
Anatomy of power system blackouts: Preventive relaying strategies
-
S. Tamronglak, S. H. Horowitz, A.G.Phadke and J.S.Thorp, Anatomy of power system blackouts: preventive relaying strategies, IEEE Trans. Power Syst, vol. 11, no. 2, pp. 708-723, 1995.
-
(1995)
IEEE Trans. Power Syst
, vol.11
, Issue.2
, pp. 708-723
-
-
Tamronglak, S.1
Horowitz, S.H.2
Phadke, A.G.3
Thorp, J.S.4
-
2
-
-
70350568786
-
Attack structural vulnerability of complex power grids: A hybrid approach based on complex networks
-
Feb
-
G. Chen, Z.Y. Dong, D. J.Hill, G. H. Zhang and K. Q. Hua, Attack structural vulnerability of complex power grids: A hybrid approach based on complex networks, Physica A, vol. 389, pp. 595-603, Feb, 2010.
-
(2010)
Physica A
, vol.389
, pp. 595-603
-
-
Chen, G.1
Dong, Z.Y.2
Hill, D.3
Zhang, G.H.4
Hua, K.Q.5
-
3
-
-
49249134848
-
Long-term effect of n-1 criterion on cascading line outages in an evolving power transmission grid
-
Aug
-
H. Ren, I. Dobson, and B. A. Carreras, Long-term effect of n-1 criterion on cascading line outages in an evolving power transmission grid, IEEE Trans. Power Syst., vol. 23, no. 3, pp. 1217-1225, Aug. 2008.
-
(2008)
IEEE Trans. Power Syst
, vol.23
, Issue.3
, pp. 1217-1225
-
-
Ren, H.1
Dobson, I.2
Carreras, B.A.3
-
4
-
-
18944382536
-
Identifying high risk N-k contingencies for online security assessment
-
May
-
Q. Chen and J. McCalley, Identifying high risk N-k contingencies for online security assessment, IEEE Trans. Power Syst., vol. 20, no. 2, pp. 823-834, May 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.2
, pp. 823-834
-
-
Chen, Q.1
McCalley, J.2
-
5
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
May
-
S. Salmeron, K. Wood, and R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004.
-
(2004)
IEEE Trans. Power Syst
, vol.19
, Issue.2
, pp. 905-912
-
-
Salmeron, S.1
Wood, K.2
Baldick, R.3
-
6
-
-
18944385541
-
On the solution of the bilevel programming formulation of the terrorist threat problem
-
May
-
J. M. Arroyo and F. D. Galiana, On the solution of the bilevel programming formulation of the terrorist threat problem, IEEE Trans. Power Syst., vol. 20, no. 2, pp. 789-797, May 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.2
, pp. 789-797
-
-
Arroyo, J.M.1
Galiana, F.D.2
-
7
-
-
24944442583
-
A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat
-
Aug
-
A. L. Motto, J. M. Arroyo, and F. D. Galiana, A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat, IEEE Trans. Power Syst., vol. 20, no. 3, pp. 1357-1365, Aug. 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.3
, pp. 1357-1365
-
-
Motto, A.L.1
Arroyo, J.M.2
Galiana, F.D.3
-
8
-
-
33947365606
-
Evaluating strategies for defending electric power networks against antagonistic attacks
-
Feb
-
A. Holmgren, E. Jenelius, and J.Westin, Evaluating strategies for defending electric power networks against antagonistic attacks, IEEE Trans. Power Syst., vol. 22, no. 1, pp. 76-84, Feb. 2007.
-
(2007)
IEEE Trans. Power Syst
, vol.22
, Issue.1
, pp. 76-84
-
-
Holmgren, A.1
Jenelius, E.2
Westin, J.3
-
9
-
-
79960851392
-
Exploring reliable strategies for defending power systems against targeted attacks
-
Aug
-
G. Chen, Z.Y. Dong and D.J. Hill, Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks, IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1000-1009, Aug. 2011.
-
(2011)
IEEE Trans. Power Syst
, vol.26
, Issue.3
, pp. 1000-1009
-
-
Chen, G.1
Dong, Z.Y.2
Hill, D.J.3
-
10
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun
-
Y. Yuan, Z. Li and K. Ren, Modeling Load Redistribution Attacks in Power Systems, IEEE Transaction on Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
-
(2011)
IEEE Transaction on Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
11
-
-
84864607132
-
Quantitative analysis of load redistribution attacks in electric grid
-
Y. Yuan, Z. Li and K. Ren, Quantitative Analysis of Load Redistribution Attacks in Electric Grid, IEEE Transaction on Parallel and Distribution Systems, vol. 23, no. 9, pp. 1731-1738.
-
IEEE Transaction on Parallel and Distribution Systems
, vol.23
, Issue.9
, pp. 1731-1738
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
12
-
-
34447298615
-
Trilevel optimization in power network defense
-
July
-
Y. Yao, T. Edmunds, D. Papageorgiou and R. Alvarez, Trilevel Optimization in power network defense, IEEE Trans. On Syst, Man, and Cybernetics-Part C: application and reviews, vol. 37, no. 4, July 2007.
-
(2007)
IEEE Trans. on Syst, Man, and Cybernetics-Part C: Application and Reviews
, vol.37
, Issue.4
-
-
Yao, Y.1
Edmunds, T.2
Papageorgiou, D.3
Alvarez, R.4
-
13
-
-
84914405497
-
Optimal power flow solutions
-
H. W. Dommell and W. F. Tinney, Optimal Power Flow Solutions, IEEE Trans. on PAS, Vol. 87, pp. 1866-1876.1968.
-
(1968)
IEEE Trans. on PAS
, vol.87
, pp. 1866-1876
-
-
Dommell, H.W.1
Tinney, W.F.2
-
15
-
-
10444288712
-
-
Springer and Verlag, New York
-
Xifan Wang, Yonghua Song, and Malcolm Irving, Modern power system analysis, Springer and Verlag, New York, 2008.
-
(2008)
Modern Power System Analysis
-
-
Wang, X.1
Song, Y.2
Irving, M.3
-
16
-
-
14844322217
-
Cascading dynamics and mitigation assessment in power system disturbance via a hidden failure model
-
J. Chen, J. S. Thorp, and I. Dobson, Cascading dynamics and mitigation assessment in power system disturbance via a hidden failure model, Elect. Power Energy Syst., vol. 27, pp. 318-326, 2005.
-
(2005)
Elect. Power Energy Syst
, vol.27
, pp. 318-326
-
-
Chen, J.1
Thorp, J.S.2
Dobson, I.3
|