暂无分享,去创建一个
Ramesh Karri | Charalambos Konstantinou | Samrat Acharya | Yury Dvorkin | Robert Mieth | Charalambos Konstantinou | R. Karri | Y. Dvorkin | Samrat Acharya | R. Mieth
[1] Long Zhao,et al. Solving two-stage robust optimization problems using a column-and-constraint generation method , 2013, Oper. Res. Lett..
[2] Panagiotis Patrinos,et al. Risk-Averse Model Predictive Operation Control of Islanded Microgrids , 2018, IEEE Transactions on Control Systems Technology.
[3] Bianca Schroeder,et al. A Large-Scale Study of Failures in High-Performance Computing Systems , 2006, IEEE Transactions on Dependable and Secure Computing.
[4] Lingfeng Wang,et al. An Actuarial Framework for Power System Reliability Considering Cybersecurity Threats , 2021, IEEE Transactions on Power Systems.
[5] Vipul Jain,et al. Availability Analysis of Repairable Mechanical Systems Using Analytical Semi-Markov Approach , 2013 .
[6] B. Herrin,et al. Cybersecurity insurance. , 2011, Journal of AHIMA.
[7] Jacob Mashiah,et al. It's time for a change. , 2005, Clinics in dermatology.
[8] Ramesh Karri,et al. Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective , 2020, IEEE Access.
[9] Michael C. Caramanis,et al. Co-Optimization of Power and Reserves in Dynamic T&D Power Markets With Nondispatchable Renewable Generation and Distributed Energy Resources , 2016, Proceedings of the IEEE.
[10] Abdullah M. Al-Shaalan,et al. Reliability Evaluation of Power Systems , 2019, Reliability and Maintenance - An Overview of Cases.
[11] C. Maple,et al. Securing the Electric Vehicle Charging Infrastructure , 2021, ArXiv.
[12] Liudong Xing,et al. Probabilistic modeling and analysis of sequential cyber‐attacks , 2019, Engineering Reports.
[13] Ulrik Franke,et al. The Distribution of Time to Recovery of Enterprise IT Services , 2014, IEEE Transactions on Reliability.
[14] Antonio J. Conejo,et al. Robust transmission expansion planning , 2015, Eur. J. Oper. Res..
[15] Chee-Wooi Ten,et al. A Coalitional Cyber-Insurance Design Considering Power System Reliability and Cyber Vulnerability , 2021, IEEE Transactions on Power Systems.
[16] Dinh Thai Hoang,et al. Charging and Discharging of Plug-In Electric Vehicles (PEVs) in Vehicle-to-Grid (V2G) Systems: A Cyber Insurance-Based Model , 2017, IEEE Access.
[17] Charalambos Konstantinou,et al. On the Feasibility of Load-Changing Attacks in Power Systems During the COVID-19 Pandemic , 2020, IEEE Access.
[18] M. E. Baran,et al. Optimal capacitor placement on radial distribution systems , 1989 .
[19] Therese Jones,et al. Content analysis of cyber insurance policies: how do carriers price cyber risk? , 2019, J. Cybersecur..
[20] Zhu Han,et al. Cyber Insurance for Plug-In Electric Vehicle Charging in Vehicle-to-Grid Systems , 2017, IEEE Network.
[21] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[22] Daniel W. Woods,et al. The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices , 2019 .
[23] Ramesh Karri,et al. Public Plug-in Electric Vehicles + Grid Data: Is a New Cyberattack Vector Viable? , 2019, IEEE Transactions on Smart Grid.
[24] Shivam Gupta,et al. Vehicle Cybersecurity Threats and Mitigation Approaches , 2019 .
[25] Manoj Basnet,et al. Exploring Cybersecurity Issues in 5G Enabled Electric Vehicle Charging Station with Deep Learning , 2021, IET Generation, Transmission & Distribution.
[26] H. Vincent Poor,et al. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid , 2018, USENIX Security Symposium.
[27] Mustafa Bagriyanik,et al. Disrupting the power grid via EV charging: The impact of the SMS Phishing attacks , 2021 .
[28] Christodoulos A. Floudas,et al. Global Optimization of Nonlinear Bilevel Programming Problems , 2001, J. Glob. Optim..
[29] R J Fosdick. THE ELECTRIC VEHICLE , 1977 .
[30] R. Tyrrell Rockafellar,et al. Coherent Approaches to Risk in Optimization Under Uncertainty , 2007 .
[31] IBM: Cost of a Data Breach Report , 2021, Computer Fraud & Security.
[32] Jay Johnson. Securing Vehicle Charging Infrastructure. , 2020 .
[33] Talal Rahwan,et al. Manipulating Residents’ Behavior to Attack the Urban Power Distribution System , 2019, IEEE Transactions on Industrial Informatics.
[34] Johnny Chang Kuan-Chun. I.40 International Association of Insurance Supervisors (IAIS) , 2017 .
[35] Amr Youssef,et al. Impact of Electric Vehicles Botnets on the Power Grid , 2019, 2019 IEEE Electrical Power and Energy Conference (EPEC).
[36] Lingfeng Wang,et al. A Cybersecurity Insurance Model for Power System Reliability Considering Optimal Defense Resource Allocation , 2020, IEEE Transactions on Smart Grid.
[37] Graham Watson,et al. DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report , 2018 .
[38] Hamed Mohsenian-Rad,et al. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.
[39] Lingfeng Wang,et al. Premium Calculation for Insurance Businesses Based on Cyber Risks in IP-Based Power Substations , 2020, IEEE Access.
[40] Ramesh Karri,et al. Causative Cyberattacks on Online Learning-Based Automated Demand Response Systems , 2021, IEEE Transactions on Smart Grid.