Optimal power grid protection through a defender-attacker-defender model
暂无分享,去创建一个
[1] Harry W. Richardson,et al. The Economic Costs and Consequences of Terrorism , 2008 .
[2] Enrico Zio,et al. Reliability engineering: Old problems and new challenges , 2009, Reliab. Eng. Syst. Saf..
[3] G. Sheblé,et al. Power generation operation and control — 2nd edition , 1996 .
[4] J. Salmeron,et al. Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.
[5] Enrico Zio,et al. Optimizing protections against cascades in network systems: A modified binary differential evolution algorithm , 2012, Reliab. Eng. Syst. Saf..
[6] Bo Zeng,et al. Vulnerability Analysis of Power Grids With Line Switching , 2013, IEEE Transactions on Power Systems.
[7] Rae Zimmerman,et al. Risk and Economic Costs of a Terrorist Attack on the Electric System , 2007 .
[8] Vicki M. Bier,et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..
[9] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[10] Gregory Levitin,et al. Importance of protections against intentional attacks , 2008, Reliab. Eng. Syst. Saf..
[11] Panos M. Pardalos,et al. A mixed integer programming approach for optimal power grid intentional islanding , 2012, Energy Systems.
[12] Kjell Hausken. Strategic defense and attack for reliability systems , 2008, Reliab. Eng. Syst. Saf..
[13] Long Zhao,et al. Solving two-stage robust optimization problems using a column-and-constraint generation method , 2013, Oper. Res. Lett..
[14] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[15] Eitan Israeli. System Interdiction and Defense. , 1999 .
[16] Gerald G. Brown,et al. Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .
[17] Dick Duffey,et al. Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.
[18] Philip G. Hill,et al. Power generation , 1927, Journal of the A.I.E.E..
[19] George E. Apostolakis,et al. Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..
[20] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[21] Mulukutla S. Sarma,et al. Power System Analysis and Design , 1993 .
[22] R. Alvarez,et al. Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[23] Mohammad Shahidehpour,et al. The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .
[24] John C. McDonald,et al. Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..
[25] Gregory Levitin,et al. Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..
[26] F.D. Galiana,et al. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.
[27] Long Zhao,et al. An Exact Algorithm for Power Grid Interdiction Problem with Line Switching , 2012 .
[28] George E Apostolakis,et al. A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[29] Bo Zeng. Solving Two-stage Robust Optimization Problems by A Constraint-and-Column Generation Method , 2011 .
[30] Natalia Alguacil,et al. Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.