-
3
-
-
4344657727
-
-
Aug. [Online]. Available
-
R. Christie, Power System Test Archive, Aug. 1999 [Online]. Available: http://www.ee.washington.edu/research/pstca.
-
(1999)
Power System Test Archive
-
-
Christie, R.1
-
5
-
-
33947365606
-
Evaluating strategies for defending electric power networks against antagonistic attacks
-
Feb.
-
A. Holmgren, E. Jenelius, and J. Westin, "Evaluating strategies for defending electric power networks against antagonistic attacks," IEEE Trans. Power Syst., vol. 22, no. 1, pp. 76-84, Feb. 2007,
-
(2007)
IEEE Trans. Power Syst.
, vol.22
, Issue.1
, pp. 76-84
-
-
Holmgren, A.1
Jenelius, E.2
Westin, J.3
-
6
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
May
-
J. Salmeron, K. Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004.
-
(2004)
IEEE Trans. Power Syst.
, vol.19
, Issue.2
, pp. 905-912
-
-
Salmeron, J.1
Wood, K.2
Baldick, R.3
-
7
-
-
79952031971
-
Against all odds
-
Mar./Apr.
-
P. H. Corredor and M. E. Ruiz, "Against all odds," IEEE Power Energy Mag., vol. 9, no. 2, pp. 59-66, Mar./Apr. 2011.
-
(2011)
IEEE Power Energy Mag.
, vol.9
, Issue.2
, pp. 59-66
-
-
Corredor, P.H.1
Ruiz, M.E.2
-
9
-
-
77956066759
-
The N - k problem in power grids: New models, formulations, and numerical experiments
-
D. Bienstock and A. Verma, "The N - k problem in power grids: New models, formulations, and numerical experiments," SIAM J. Optimiz., vol. 20, no. 5, pp. 2352-2380, 2010.
-
(2010)
SIAM J. Optimiz.
, vol.20
, Issue.5
, pp. 2352-2380
-
-
Bienstock, D.1
Verma, A.2
-
10
-
-
0242369050
-
Power signature analysis
-
C. Laughman, K. Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong, "Power signature analysis," IEEE Power Energy Mag., vol. 1, no. 2, pp. 56-63, 2003.
-
(2003)
IEEE Power Energy Mag.
, vol.1
, Issue.2
, pp. 56-63
-
-
Laughman, C.1
Lee, K.2
Cox, R.3
Shaw, S.4
Leeb, S.5
Norford, L.6
Armstrong, P.7
-
11
-
-
33749620752
-
Physical security and vulnerability modeling for infrastructure facilities
-
D. A. Jones, C. E. Davis, M. A. Turnquist, and L. K. Nozick, "Physical security and vulnerability modeling for infrastructure facilities," in Proc. Hawaii Int. Conf. Syst. Sci., 2006.
-
(2006)
Proc. Hawaii Int. Conf. Syst. Sci.
-
-
Jones, D.A.1
Davis, C.E.2
Turnquist, M.A.3
Nozick, L.K.4
-
12
-
-
33845439386
-
Defending critical infrastructure
-
G. Brown, M. Carlyle, J. Salmeron, and K. Wood, "Defending critical infrastructure," Interfaces, vol. 36, no. 6, pp. 530-544, 2006.
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
13
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
R. Powell, "Allocating defensive resources with private information about vulnerability," Amer. Polit. Sci. Rev., vol. 101, no. 4, pp. 799-809, 2007.
-
(2007)
Amer. Polit. Sci. Rev.
, vol.101
, Issue.4
, pp. 799-809
-
-
Powell, R.1
-
14
-
-
79960851392
-
Exploring reliable strategies for defending power systems against targeted attacks
-
Aug.
-
G. Chen, Z. Y. Dong, D. J. Hill, and Y. S. Xue, "Exploring reliable strategies for defending power systems against targeted attacks," IEEE Trans. Power Syst, vol. 26, no. 3, pp. 1000-1009, Aug. 2011.
-
(2011)
IEEE Trans. Power Syst
, vol.26
, Issue.3
, pp. 1000-1009
-
-
Chen, G.1
Dong, Z.Y.2
Hill, D.J.3
Xue, Y.S.4
-
16
-
-
77951289683
-
Optimization strategies for the vulnerability analysis of the electric power grid
-
A. Pinar, J. Meza, V. Donde, and B. Lesieutre, "Optimization strategies for the vulnerability analysis of the electric power grid," SIAM J. Optimiz., vol. 20, no. 4, pp. 1786-1810, 2010.
-
(2010)
SIAM J. Optimiz.
, vol.20
, Issue.4
, pp. 1786-1810
-
-
Pinar, A.1
Meza, J.2
Donde, V.3
Lesieutre, B.4
-
17
-
-
0000929496
-
Multiagent reinforcement learning: Theoretical framework and an algorithm
-
J. Hu and M. P. Wellman, "Multiagent reinforcement learning: Theoretical framework and an algorithm," in Proc. Int. Conf. Mach. Learning, 1998.
-
(1998)
Proc. Int. Conf. Mach. Learning
-
-
Hu, J.1
Wellman, M.P.2
-
18
-
-
34547641190
-
Choosing what to protect
-
V. M. Bier, S. Oliveros, and L. Samuelson, "Choosing what to protect," J. Public Econ. Theory, vol. 9, no. 4, pp. 563-587, 2007.
-
(2007)
J. Public Econ. Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
19
-
-
54049110511
-
False targets efficiency in defense strategy
-
G. Levitin and K. Hausken, "False targets efficiency in defense strategy," Eur. J. Oper. Res., vol. 194, no. 1, pp. 155-162, 2009.
-
(2009)
Eur. J. Oper. Res.
, vol.194
, Issue.1
, pp. 155-162
-
-
Levitin, G.1
Hausken, K.2
-
20
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
J. Zhuang, V. M. Bier, and O. Alagoz, "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," Eur. J. Oper. Res., vol. 203, no. 2, pp. 409-418, 2010.
-
(2010)
Eur. J. Oper. Res.
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
-
25
-
-
85149834820
-
Markov games as a framework for multi-agent reinforcement learning
-
M. Littman, "Markov games as a framework for multi-agent reinforcement learning," in Proc. Int. Conf. Mach. Learning, 1994.
-
(1994)
Proc. Int. Conf. Mach. Learning
-
-
Littman, M.1
-
26
-
-
0004260006
-
-
2nd ed. New York: Academic
-
G. Owen, Game Theory, 2nd ed. New York: Academic, 1982.
-
(1982)
Game Theory
-
-
Owen, G.1
-
28
-
-
0003353228
-
Assessing reliability as the electric power industry restructures
-
M. Ilic, J. Arce, Y. Y. Yoon, and E. Fumagalli, "Assessing reliability as the electric power industry restructures," Electricity J., vol. 14, no. 2, pp. 55-67, 2001.
-
(2001)
Electricity J.
, vol.14
, Issue.2
, pp. 55-67
-
-
Ilic, M.1
Arce, J.2
Yoon, Y.Y.3
Fumagalli, E.4
|