Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme
暂无分享,去创建一个
Kenneth M. Hopkinson | Brett J. Borghetti | Jeffrey W. Humphries | John F. Borowski | J. Humphries | K. Hopkinson | B. Borghetti | J. Borowski
[1] James S. Thorp,et al. Expose hidden failures to prevent cascading outages [in power systems] , 1996 .
[2] Jian-Wei Wang,et al. Cascade-based attack vulnerability on the US power grid. , 2009 .
[3] W. Wang,et al. Collaborative Trust in Multi-agent System , 2007, 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007).
[4] Jesse C Arnold Professor Emeritus,et al. Introduction to Probability and Statistics: Principles and Applications for Engineering and the Computing Sciences , 1990 .
[5] J. Lewis Blackburn,et al. Protective Relaying: Principles And Applications , 2006 .
[6] Jason Leigh,et al. Reliable Blast UDP : predictable high performance bulk data transfer , 2002, Proceedings. IEEE International Conference on Cluster Computing.
[7] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[8] Pierluigi Siano,et al. Adaptive relays for overhead line protection , 2007 .
[9] Member Ieee,et al. Developing an Agent-based Backup Protection System for Transmission Networks , 2002 .
[10] Ken Barnes,et al. Introduction to SCADA Protection and Vulnerabilities , 2004 .
[11] Gary C. Kessler,et al. An Overview of Steganography for the Computer Forensics Examiner , 2004 .
[12] D.V. Coury,et al. A primary and backup cooperative protection system based on wide area agents , 2004, 2004 IEEE/PES Transmision and Distribution Conference and Exposition: Latin America (IEEE Cat. No. 04EX956).
[13] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[14] Deborah Estrin,et al. Advances in network simulation , 2000, Computer.
[15] Kenji Ishida,et al. Parallel Downloading Method using HTTP over UDP for High Loss Rate and Delay Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[16] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[17] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[18] George W Bush,et al. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .
[19] Mark S. Fox,et al. An ontology of trust: formal semantics and transitivity , 2006, ICEC '06.
[20] Bryan Krekel,et al. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation , 2009 .
[21] William Shaw,et al. Cybersecurity for SCADA Systems , 2006 .
[22] R. Moxley,et al. High-speed distribution protection made easy: communications-assisted protection schemes for distribution applications , 2005, 58th Annual Conference for Protective Relay Engineers, 2005..
[23] Jiang Ying,et al. A Trust Management Model Based on Multi-agent System , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.
[24] Mohammad Shahidehpour,et al. Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .
[25] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[26] Stephen Marsh. Trust and Reliance in Multi-Agent Systems: A Preliminary Report , 2007 .
[27] A. Jøsang,et al. Challenges for Robust Trust and Reputation Systems , 2009 .
[28] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[29] Peter G. Neumann,et al. Toward a safer and more secure cyberspace , 2007, CACM.
[30] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[31] James S. Thorp,et al. Agent Technology Applied to the Protection of Power Systems , 2003 .
[32] K. Schwalm. National Strategy to Secure Cyberspace , 2006 .
[33] Scott Graham,et al. Collaborative, trust-based security mechanisms for a regional utility intranet , 2009, 2009 IEEE Power & Energy Society General Meeting.
[34] Prathima Agrawal,et al. Voice performance in WLAN networks - an experimental study , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[35] Sarvapali D. Ramchurn,et al. Trust in multi-agent systems , 2004, The Knowledge Engineering Review.
[36] David S. Wall,et al. CYBERCRIME AND THE CULTURE OF FEAR , 2008 .
[37] James C. Mulvenon,et al. The People’s Liberation Army in the Information Age: , 1999 .
[38] R. Giovanini,et al. EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.
[39] Dewen Wang,et al. Multiagents-based wide area protection with best-effort adaptive strategy , 2009 .
[40] Bing Chen,et al. Implementing VoIP: a voice transmission performance progress report , 2004, IEEE Communications Magazine.
[41] Yao-Hua Tan,et al. Trust in Cyber-societies: Integrating the Human and Artificial Perspectives , 2000, Lecture Notes in Computer Science.
[42] Alberto Leon-Garcia,et al. Communication Networks , 2000 .
[43] Arun G. Phadke,et al. Power System Relaying , 1992 .
[44] Anthony M. Sleva. Protective Relay Principles , 2009 .
[45] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[46] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[47] A. V. Meier. Electric power systems : a conceptual introduction , 2006 .
[48] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.