暂无分享,去创建一个
Deepjyoti Deka | Anna Scaglione | Kaarthik Sundar | Anatoly Zlotnik | Ignacio Losada Carreno | A. Scaglione | K. Sundar | Anatoly Zlotnik | Deepjyoti Deka | I. Carreño
[1] R. H. Kerr,et al. Unit commitment , 1966, Mathematical Programming for Power Systems Operation with Applications in Python.
[2] Luciana Obregon,et al. SANS Institute Information Security Reading Room Secure Architecture for Industrial Control Systems , 2019 .
[3] Kenneth Steiglitz,et al. Optimal Design of Offshore Natural-Gas Pipeline Systems , 1970, Oper. Res..
[4] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[5] Demosthenis Teneketzis,et al. Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.
[6] Karen A. Scarfone,et al. Cyber Security Metrics and Measures , 2008 .
[7] Philip M. Besuner,et al. Impacts of Wind and Solar on Fossil-Fueled Generators: Preprint , 2012 .
[8] Danièle Revel,et al. On natural gas prices , 2012 .
[9] Steve Edwardson. The Next Dimension of Flow Profiles , 2016 .
[10] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[11] Roger Z. Ríos-Mercado,et al. Optimization problems in natural gas transportation systems. A state-of-the-art review , 2015 .
[12] Aleksandr Rudkevich,et al. Economic Optimization of Intra-Day Gas Pipeline Flow Schedules using Transient Flow Models , 2017 .
[13] Miles A. McQueen,et al. Ideal Based Cyber Security Technical Metrics for Control Systems , 2007, CRITIS.
[14] A.I. Cohen,et al. Optimization-based methods for operations scheduling , 1987, Proceedings of the IEEE.
[15] A. Monticelli,et al. Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.
[16] Michael Chertkov,et al. Control policies for operational coordination of electric power and natural gas transmission systems , 2016, 2016 American Control Conference (ACC).
[17] Russell Bent,et al. Unit commitment with N-1 Security and wind uncertainty , 2016, 2016 Power Systems Computation Conference (PSCC).
[18] E. Shashi Menon,et al. Gas pipeline hydraulics , 2005 .
[19] R. Larson,et al. Optimization of natural-gas pipeline systems via dynamic programming , 1968 .
[20] Katherine R. Davis,et al. A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.
[21] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[22] A. Kolmogoroff. Über die analytischen Methoden in der Wahrscheinlichkeitsrechnung , 1931 .
[23] Michael Chertkov,et al. Optimal control of transient flow in natural gas networks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[24] Michael Chertkov,et al. Model Reduction and Optimization of Natural Gas Pipeline Dynamics , 2015 .
[25] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[26] Ren. Renewables 2019 Global Status Report , 2012 .
[27] Lorenz T. Biegler,et al. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..
[28] J. J. Shaw,et al. A direct method for security-constrained unit commitment , 1995 .
[29] Michael Chertkov,et al. Coordinated Scheduling for Interdependent Electric Power and Natural Gas Infrastructures , 2017 .
[30] Bri-Mathias Hodge,et al. The Value of Day-Ahead Coordination of Power and Natural Gas Network Operations , 2018 .
[31] Andrew L. Rukhin,et al. Continuous-Time Markov Chains and Applications: A Singular Perturbation Approach , 2001, Technometrics.
[32] W. J. Anderson. Continuous-Time Markov Chains: An Applications-Oriented Approach , 1991 .
[33] William F. Tinney,et al. Power Flow Solution by Newton's Method , 1967 .