Power system resilience through defender-attacker-defender models with uncertainty: an overview
暂无分享,去创建一个
Arnab Bhattacharya | Samrat Chatterjee | Craig Bakker | Matthew Oster | Feng Pan | Casey Perkins | Arnab Bhattacharya | M. Oster | Craig Bakker | S. Chatterjee | Casey Perkins | Feng Pan
[1] Gerald G. Brown,et al. Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.
[2] J. Cole Smith,et al. A survey of network interdiction models and algorithms , 2020, Eur. J. Oper. Res..
[3] Gerald G. Brown,et al. Operational Models of Infrastructure Resilience , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[4] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[5] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[6] J. Harsanyi. Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .
[7] José Fortuny-Amat,et al. A Representation and Economic Interpretation of a Two-Level Programming Problem , 1981 .
[8] Mojtaba Shivaie,et al. A vulnerability-constrained quad-level model for coordination of generation and transmission expansion planning under seismic- and terrorist-induced events , 2020 .
[9] Long Zhao,et al. Solving two-stage robust optimization problems using a column-and-constraint generation method , 2013, Oper. Res. Lett..
[10] Kalyanmoy Deb,et al. A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications , 2017, IEEE Transactions on Evolutionary Computation.
[11] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[12] Mohammad Shahidehpour,et al. The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .
[13] Gerald G. Brown,et al. Assessing and Improving Operational Resilience of Critical Infrastructures and Other Systems , 2014 .
[14] Zhong Chen,et al. Pessimistic Bilevel Optimization: A Survey , 2018, Int. J. Comput. Intell. Syst..
[15] Melvyn Sim,et al. The Price of Robustness , 2004, Oper. Res..
[16] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.
[17] Antonio J. Conejo,et al. Robust Security Constrained ACOPF via Conic Programming: Identifying the Worst Contingencies , 2018, IEEE Transactions on Power Systems.
[18] Xu Andy Sun,et al. Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem , 2013, IEEE Transactions on Power Systems.
[19] Hiroshi Konno,et al. A cutting plane algorithm for solving bilinear programs , 1976, Math. Program..
[20] André Bardow,et al. Robust multi-objective optimization for sustainable design of distributed energy supply systems , 2017, Comput. Chem. Eng..
[21] Mingjian Cui,et al. Multilevel Programming-Based Coordinated Cyber Physical Attacks and Countermeasures in Smart Grid , 2019, IEEE Access.
[22] Yaoguang Hu,et al. Multilevel decision-making: A survey , 2016, Inf. Sci..
[23] A. Ruszczynski. Stochastic Programming Models , 2003 .
[24] Javier Salmerón,et al. Deception tactics for network interdiction: A multiobjective approach , 2012, Networks.
[25] Xiaojun Shan,et al. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels , 2020, Reliab. Eng. Syst. Saf..
[26] Ross Baldick,et al. Research on Resilience of Power Systems Under Natural Disasters—A Review , 2016, IEEE Transactions on Power Systems.
[27] Constantine Caramanis,et al. Theory and Applications of Robust Optimization , 2010, SIAM Rev..
[28] Abdullah Abusorrah,et al. Minimax-Regret Robust Defensive Strategy Against False Data Injection Attacks , 2019, IEEE Transactions on Smart Grid.
[29] Antonio J. Conejo,et al. Robust Transmission Expansion Planning Representing Long- and Short-Term Uncertainty , 2018, IEEE Transactions on Power Systems.
[30] Arnab Bhattacharya,et al. Learning and Information Manipulation: Repeated Hypergames for Cyber-Physical Security , 2020, IEEE Control Systems Letters.
[31] Rigg Nj. A storm to remember. , 2002 .
[32] Jason R. W. Merrick,et al. Stochastic network interdiction with incomplete preference , 2018, Networks.
[33] Heinrich von Stackelberg. Grundlagen einer reinen Kostentheorie , 1932 .
[34] Nancy J Rigg. A storm to remember. , 2002, Emergency medical services.
[35] R. Alvarez,et al. Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[36] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[37] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..