Correlated Failures of Power Systems : Analysis of the Nordic Grid
暂无分享,去创建一个
Karl Henrik Johansson | Henrik Sandberg | S. Shankar Sastry | Saurabh Amin | Martin Andreasson | Galina Schwartz | S. Sastry | K. Johansson | G. Schwartz | H. Sandberg | Saurabh Amin | Martin Andreasson
[1] B. Bereanu,et al. The continuity of the optimum in parametric programming and applications to stochastic programming , 1976 .
[2] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[3] Adam Stotz,et al. Situational awareness of a coordinated cyber attack , 2005, SPIE Defense + Commercial Sensing.
[4] Kishor S. Trivedi,et al. Fighting bugs: remove, retry, replicate, and rejuvenate , 2007, Computer.
[5] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[6] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[7] Caixa Postal. OPTIMAL ACTIVE POWER DISPATCH BY NETWORK FLOW APPROACH , 1988 .
[8] K. Uhlen,et al. Monitoring amplitude, frequency and damping of power system oscillations with PMU measurements , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[9] Adilson E. Motter,et al. Stochastic Model for Power Grid Dynamics , 2006, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[10] Bapi Chatterjee,et al. An optimization formulation to compute Nash equilibrium in finite games , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).
[11] Arun G. Phadke,et al. Synchronized phasor measurements-a historical overview , 2002, IEEE/PES Transmission and Distribution Conference and Exhibition.
[12] Janusz Bialek,et al. Approximate model of European interconnected system as a benchmark system to study effects of cross-border trades , 2005 .
[13] B Stott,et al. Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.
[14] Geir Storvik,et al. Simulation and Monte Carlo Methods , 2006 .
[15] J. Mcneff. The global positioning system , 2002 .
[16] Ingrid Verbauwhede,et al. Intrinsic PUFs from Flip-flops on Reconfigurable Devices , 2008 .
[17] Roy Billinton,et al. A security based approach to composite power system reliability evaluation , 1992 .
[18] Claudia Eckert,et al. Improving the quality of ring oscillator PUFs on FPGAs , 2010, WESS '10.
[19] G. T. Heydt,et al. Power flow control and power flow studies for systems with FACTS devices , 1998 .
[20] Jizhong Zhu,et al. Optimization of Power System Operation , 2009 .
[21] H. Happ,et al. Quadratically Convergent Optimal Power Flow , 1984, IEEE Transactions on Power Apparatus and Systems.
[22] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[23] K. Uhlen,et al. Deployment of a SCADA integrated wide area monitoring system , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition: Latin America.
[24] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[25] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[26] John D. Fernandez,et al. SCADA systems: vulnerabilities and remediation , 2005 .
[27] Markus Jakobsson,et al. Implicit authentication for mobile devices , 2009 .
[28] A. Daneels,et al. Современные SCADA-системы , 2017 .
[29] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[30] Alexander S. Ecker,et al. Generating Spike Trains with Specified Correlation Coefficients , 2009, Neural Computation.
[31] R. Billinton,et al. Probabilistic assessment of power systems , 2000, Proceedings of the IEEE.
[32] Roy Billinton,et al. Distribution system reliability cost/worth analysis using analytical and sequential simulation techniques , 1998 .
[33] Johan Efberg,et al. YALMIP : A toolbox for modeling and optimization in MATLAB , 2004 .
[34] M. Amin,et al. Security challenges for the electricity infrastructure , 2002 .
[35] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[36] D. Reed. Electric utility distribution analysis for extreme winds , 2008 .
[37] Paris Kitsos,et al. A reconfigurable linear feedback shift register (LFSR) for the Bluetooth system , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).
[38] J. Lofberg,et al. YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).
[39] Nitesh Saxena,et al. Universal device pairing using an auxiliary device , 2008, SOUPS '08.
[40] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[41] M. Hemmingsson,et al. Wide area system monitoring and control - terminology, phenomena, and solution implementation strategies , 2004, IEEE Power and Energy Magazine.
[42] Takaaki Ohishi,et al. Optimal active power dispatch by network flow approach , 1988 .
[43] Francisco D. Galiana,et al. A survey of the optimal power flow literature , 1991 .
[44] D. Duffie,et al. An Overview of Value at Risk , 1997 .
[45] M. Ferris,et al. Optimal Transmission Switching , 2008, IEEE Transactions on Power Systems.
[46] Reuven Y. Rubinstein,et al. Simulation and the Monte Carlo method , 1981, Wiley series in probability and mathematical statistics.
[47] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[48] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[49] N.G. Hingorani,et al. Flexible AC transmission , 1993, IEEE Spectrum.
[50] Rached Tourki,et al. A Reconfigurable Implementation of the New Secure Hash Algorithm , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[51] Karsten Neuhoff,et al. Working Papers in Economics CWPE 0463 Electricity Transmission : An Overview of the Current Debate , 2004 .
[52] Zhao Xu,et al. Evaluating frequency quality of Nordic system using PMU data , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[53] D. Fudenberg,et al. The Theory of Learning in Games , 1998 .
[54] Hua Wei,et al. An interior point nonlinear programming for optimal power flow problems with a novel data structure , 1997 .
[55] James S. Thorp,et al. Expose hidden failures to prevent cascading outages [in power systems] , 1996 .
[56] Daniel Karlsson,et al. Wide-Area Protection and Power System Utilization , 2005, Proceedings of the IEEE.
[57] Peng Wang,et al. Teaching distribution system reliability evaluation using Monte Carlo simulation , 1999 .
[58] Xiao-Ping Zhang,et al. Advanced implementation of UPFC in a nonlinear interior-point OPF , 2001 .
[59] Y. Z. Sun,et al. Power Flow Control Approach to Power Systems with Embedded Facts Devices , 2002, IEEE Power Engineering Review.
[60] Liam Murphy,et al. An open design approach for distributed energy management systems , 1993 .
[61] R. Adapa,et al. A review of selected optimal power flow literature to 1993. II. Newton, linear programming and interior point methods , 1999 .
[62] Laurent Alaus,et al. A reconfigurable linear feedback shift register operator for software defined radio terminal , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.
[63] Rachel A. Davidson,et al. Electric Power Distribution System Performance in Carolina Hurricanes , 2003 .
[64] W. Tinney,et al. Optimal Power Flow By Newton Approach , 1984, IEEE Transactions on Power Apparatus and Systems.
[65] A.G. Phadke,et al. Synchronized phasor measurements in power systems , 1993, IEEE Computer Applications in Power.
[66] X. Wang,et al. Modern power system planning , 1994 .
[67] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[68] S. Nassif. Delay variability: sources, impacts and trends , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).
[69] O. S. Grande,et al. Experience with the Nord Pool design and implementation , 2003 .
[70] Mohammed H. Albadi,et al. Demand Response in Electricity Markets: An Overview , 2007, 2007 IEEE Power Engineering Society General Meeting.
[71] J.W. Bialek,et al. Approximate model of European interconnected system as a benchmark system to study effects of cross-border trades , 2005, IEEE Transactions on Power Systems.
[72] M.T.O. Amanullah,et al. Network Security Vulnerabilities in SCADA and EMS , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.
[73] B.F. Wollenberg,et al. Toward a smart grid: power delivery for the 21st century , 2005, IEEE Power and Energy Magazine.
[74] Jason Cong,et al. Challenges and Opportunities for Design Innovations in Nanometer Technologies , 1998 .
[75] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[76] Michael Chertkov,et al. Predicting Failures in Power Grids , 2010 .
[77] A.M.L. da Silva,et al. Well-being analysis for composite generation and transmission systems , 2004, IEEE Transactions on Power Systems.
[78] Thiagalingam Kirubarajan,et al. Estimation with Applications to Tracking and Navigation , 2001 .
[79] Wenyuan Li,et al. Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .
[80] Vito Latora,et al. Modeling cascading failures in the North American power grid , 2005 .
[81] Juan C. Meza,et al. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid , 2010, SIAM J. Optim..
[82] J. Arroyo,et al. On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.
[83] David Watts. Security & Vulnerability in Electric Power Systems , 2003 .
[84] S. C. Srivastava,et al. Optimal reactive power dispatch considering FACTS devices , 1997 .
[85] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[86] Ali Abur,et al. Static security enhancement via optimal utilization of thyristor-controlled series capacitors , 2002 .
[87] Michael G. Pollitt,et al. The arguments for and against ownership unbundling of energy transmission networks , 2008 .
[88] R. Pappu,et al. Physical One-Way Functions , 2002, Science.