Risk Assessment of Malicious Attacks Against Power Systems
暂无分享,去创建一个
Ciwei Gao | Ettore Bompard | Marcelo Masera | Roberto Napoli | Angela Russo | Alberto Stefanini | E. Bompard | R. Napoli | A. Russo | M. Masera | A. Stefanini | Ciwei Gao
[1] Arkady B. Zaslavsky,et al. Multiple-Agent Perspectives in Reasoning About Situations for Context-Aware Pervasive Computing Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[2] Jon Cauley,et al. Intervention Policy Analysis of Skyjackings and Other Terrorist Incidents , 1988 .
[3] Oded Berman,et al. Location of terror response facilities: A game between state and terrorist , 2007, Eur. J. Oper. Res..
[4] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[5] Keith W. Hipel,et al. Policy Equilibrium and Generalized Metarationalities for Multiple Decision-Maker Conflicts , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[6] J. Arroyo,et al. On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.
[7] S. Corsi,et al. General Blackout in Italy , 2003 .
[8] V. Vittal,et al. Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[9] Ling Wang,et al. An Effective PSO-Based Hybrid Algorithm for Multiobjective Permutation Flow Shop Scheduling , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[10] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[11] V. Vittal,et al. Risk Assessment for Transformer Loading , 2001, IEEE Power Engineering Review.
[12] N. Hadjsaid,et al. Ranking Contingency Resulting from Terrorism by Utilization of Bayesian Networks , 2006, MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference.
[13] Mohammad Shahidehpour,et al. The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .
[14] Harvey E. Lapan,et al. To Bargain or Not to Bargain: That is the Question , 1988 .
[15] T. Sandler,et al. A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.
[16] Vicki M. Bier,et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..
[17] James D. McCalley,et al. Reliability of special protection systems , 1999 .
[18] Reinhard Selten. A Simple Game Model of Kidnapping , 1977 .
[19] V. Vittal,et al. Software Implementation of Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[20] Hui Ren,et al. Long-Term Effect of the n-1 Criterion on Cascading Line Outages in an Evolving Power Transmission Grid , 2008, IEEE Transactions on Power Systems.
[21] Åke J. Holmgren,et al. Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.
[22] S. Corsi,et al. General blackout in Italy Sunday September 28, 2003, h. 03:28:00 , 2004, IEEE Power Engineering Society General Meeting, 2004..
[23] Manoj Kumar Tiwari,et al. Interactive Particle Swarm: A Pareto-Adaptive Metaheuristic to Multiobjective Optimization , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[24] Todd Sandler,et al. Counterterrorism , 2005 .
[25] Ellen J. Bass,et al. Human-Automated Judge Learning: A Methodology for Examining Human Interaction With Information Analysis Automation , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.