Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering
暂无分享,去创建一个
Xi Chen | Jiguo Yu | Xiuzhen Cheng | Tao Jing | Qinghe Gao | Yawei Wang | Xiuzhen Cheng | Jiguo Yu | Xi Chen | Tao Jing | Qinghe Gao | Yawei Wang
[1] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[2] I. Dobson,et al. Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.
[3] Haibo He,et al. Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map , 2013, IEEE Transactions on Information Forensics and Security.
[4] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[5] Sun Ke. Identification of vulnerable lines in power grid based on complex network theory , 2006 .
[6] James D. McCalley,et al. Operational defence of cascading sequences , 2011, 2011 IEEE Power and Energy Society General Meeting.
[7] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[8] I. Kamwa,et al. Fuzzy Partitioning of a Real Power System for Dynamic Vulnerability Assessment , 2009, IEEE Transactions on Power Systems.
[9] Michael G. Pollitt,et al. Does Liberalisation cause more electricity blackouts? Evidence from a global study of newspaper reports , 2009 .
[10] Premananda Panigrahi,et al. Topological Analysis of Power Grid to Identify Vulnerable Transmission Lines and Nodes , 2013 .
[11] Miguel Á. Carreira-Perpiñán,et al. Constrained spectral clustering through affinity propagation , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[12] Benjamin A Carreras,et al. Complex systems analysis of series of blackouts: cascading failure, critical points, and self-organization. , 2007, Chaos.
[13] B. Fardanesh,et al. Assessing vulnerability to cascading outages , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[14] 邢凯,et al. Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective , 2012 .
[15] Wang Tao,et al. Power Betweenness Based Identification of Power Grid Critical Links , 2014 .
[16] Delbert Dueck,et al. Clustering by Passing Messages Between Data Points , 2007, Science.
[17] Zuyi Li,et al. Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.
[18] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[19] Yushuai Li,et al. Critical Nodes Identification of Power Systems Based on Controllability of Complex Networks , 2015 .
[20] Gang Chen,et al. Identification of critical lines in power grid based on electric betweenness entropy , 2015, 2015 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).
[21] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.