A novel self-evolving multi-agent architecture for power system monitoring and protection against attacks of malicious intent
暂无分享,去创建一个
S. Kamalasadan | A. Manickam | D. Edwards | G. D. Swann | S. Simmons | S. Simmons | G. Swann | A. Manickam | Sukumar Kamalasadan | Dennis Edwards
[1] P. Kundur,et al. Power system stability and control , 1994 .
[2] S.D.J. McArthur,et al. Multi-Agent Systems for Power Engineering Applications—Part II: Technologies, Standards, and Tools for Building Multi-agent Systems , 2007, IEEE Transactions on Power Systems.
[3] Luiz Eduardo Borges da Silva,et al. Improving Detection Attacks in Electric Power System Critical Infrastructure Usign Rough Classification Algorith , 2007 .
[4] T. Nagata,et al. A multi-agent approach to power system restoration , 2002 .
[5] G. Manimaran,et al. Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[6] Norman Wilde,et al. Preventing unauthorized islanding: cyber-threat analysis , 2006, 2006 IEEE/SMC International Conference on System of Systems Engineering.
[7] L. Mili,et al. Power System Stability Agents Using Robust Wide-Area Control , 2002, IEEE Power Engineering Review.
[8] I.S. Baxevanos,et al. Implementing Multiagent Systems Technology for Power Distribution Network Control and Protection Management , 2007, IEEE Transactions on Power Delivery.
[9] Zahia Guessoum. Adaptive agents and multiagent systems , 2004, IEEE Distributed Systems Online.
[10] Takeshi Nagata,et al. Power system restoration by joint usage of expert system and mathematical programming approach , 1996 .
[11] Chen-Ching Liu,et al. The strategic power infrastructure defense (SPID) system. A conceptual design , 2000, IEEE Control Systems.
[12] Chen-Ching Liu. Strategic power infrastructure defense (SPID) , 2004 .
[13] Lamine Mili,et al. Power system stability agents using robust wide area control , 2002 .
[14] I.S. Baxevanos,et al. Software Agents Situated in Primary Distribution Networks: A Cooperative System for Fault and Power Restoration Management , 2007, IEEE Transactions on Power Delivery.
[15] Chen-Ching Liu,et al. Cyber-vulnerability of power grid monitoring and control systems , 2008, CSIIRW '08.
[16] Youyi Wang,et al. Global Transient Stability and Voltage Regulation for Power Systems , 2001 .
[17] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[18] Eric Chien,et al. BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .
[19] H. F. Wang. Multi-agent co-ordination for the secondary voltage control in power-system contingencies , 2001 .
[20] S.D.J. McArthur,et al. Multi-Agent Systems for Power Engineering Applications—Part I: Concepts, Approaches, and Technical Challenges , 2007, IEEE Transactions on Power Systems.
[21] Ciwei Gao,et al. Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[22] Fei Xue,et al. Assessment of information impacts in power system security against malicious attacks in a general framework , 2009, Reliab. Eng. Syst. Saf..
[23] Norman Wilde,et al. Prevention, Detection and Recovery from Cyber-Attacks Using a Multilevel Agent Architecture , 2007, 2007 IEEE International Conference on System of Systems Engineering.