ICT and Powers Systems: An Integrated Approach
暂无分享,去创建一个
Raphael Caire | Nouredine Hadjsaid | B. Rozel | C. Tranchita | M. Viziteu | N. Hadjsaid | R. Caire | B. Rozel | C. Tranchita | M. Viziteu
[1] N. Hadjsaid,et al. Towards a common model for studying critical infrastructure interdependencies , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[2] D. Sallach,et al. Proc. of the Workshop on Agent Simulation : Applications, Models, and Tools, Oct. 15-16, 1999 , 2000 .
[3] V. Latora,et al. Complex networks: Structure and dynamics , 2006 .
[4] Mathias Ekstedt,et al. Enterprise architecture models for cyber security analysis , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[5] F. Milano,et al. An open source power system analysis toolbox , 2005, 2006 IEEE Power Engineering Society General Meeting.
[6] Giovanni Ulivi,et al. AN APPROACH TO MODEL COMPLEX INTERDEPENDENT INFRASTRUCTURES , 2005 .
[7] Henrik Jeldtoft Jensen,et al. Self-Organized Criticality: Emergent Complex Behavior in Physical and Biological Systems , 1998 .
[8] Oddbjorn Gjerde,et al. ICT Vulnerabilities of Power Systems: A Roadmap for Future Research , 2007 .
[9] Ke Sun,et al. Complex Networks Theory: A New Method of Research in Power Grid , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.
[10] Eric Bonabeau,et al. Agent-based modeling: Methods and techniques for simulating human systems , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[11] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[12] N. Hadjsaid,et al. Overview of the power systems security with regard to cyberattacks , 2009, 2009 Fourth International Conference on Critical Infrastructures.
[13] Henrik Jeldtoft Jensen,et al. Self-Organized Criticality , 1998 .
[14] Mohammad Shahidehpour,et al. Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .
[15] M.R. Permann. Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling , 2007, 2007 IEEE Conference on Technologies for Homeland Security.
[16] Judea Pearl,et al. Chapter 2 – BAYESIAN INFERENCE , 1988 .
[17] J. Stamp,et al. Common vulnerabilities in critical infrastructure control systems. , 2003 .
[18] G. Sheblé,et al. Power generation operation and control — 2nd edition , 1996 .
[19] Judea Pearl,et al. Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[20] Zhen-Xiang Han,et al. Analysis and Comparison on Several Kinds of Models of Cascading Failure in Power System , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.
[21] P. Thiran,et al. Error and attack tolerance of layered complex networks. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[22] E. Casalicchio,et al. Federated Agent-based Modeling and Simulation Approach to Study Interdependencies in IT Critical Infrastructures , 2007, 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT'07).
[23] Mohammad Shahidehpour,et al. Communication and Control in Electric Power Systems: Shahidehpour/Applications of Parallel and Distributed Processing , 2005 .
[24] Marc Barthelemy,et al. Réseaux complexes et physique statistique , 2006 .
[25] Rae Zimmerman. Decision-making and the vulnerability of interdependent critical infrastructure , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[26] Patrick Thiran,et al. Layered complex networks. , 2006, Physical review letters.
[27] John E. Mitchell,et al. Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[28] Nouredine Hadjsaid,et al. Criticality hierarchy procedure applied to software applications for electrical networks management , 2009, 2009 Fourth International Conference on Critical Infrastructures.
[29] P. Kundur,et al. Power system stability and control , 1994 .
[30] Vito Latora,et al. Modeling cascading failures in the North American power grid , 2005 .
[31] K. Schneider,et al. Assessment of interactions between power and telecommunications infrastructures , 2006, IEEE Transactions on Power Systems.
[32] John E. Mitchell,et al. Assessing vulnerability of proposed designs for interdependent infrastructure systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[33] Ian Dobson,et al. Interdependent Risk in Interacting Infrastructure Systems , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[34] Anita Raja,et al. Critical Infrastructure Integration Modeling and Simulation , 2004, ISI.
[35] Ian Dobson,et al. Risk Assessment in Complex Interacting Infrastructure Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[36] Thomas P. McLaughlin,et al. A Review of Criticality Accidents 2000 Revision , 2000 .
[37] H. Schneider. Failure mode and effect analysis : FMEA from theory to execution , 1996 .
[38] P. O'Connor,et al. Practical Reliability Engineering , 1981 .
[39] R.M. Gardner,et al. A Survey of ICT Vulnerabilities of Power Systems and Relevant Defense Methodologies , 2007, 2007 IEEE Power Engineering Society General Meeting.
[40] Kevin L. Stamber,et al. An agent-based microsimulation of critical infrastructure systems , 2000 .
[41] Alan A. Desrochers,et al. Modeling infrastructure interdependencies using Petri nets , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[42] R. Caire,et al. Modeling cyber and physical interdependencies - Application in ICT and power grids , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[43] Ake J Holmgren,et al. Using Graph Models to Analyze the Vulnerability of Electric Power Networks , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[44] Stefano Panzieri,et al. Failures propagation in critical interdependent infrastructures , 2008, Int. J. Model. Identif. Control..
[45] William Shaw,et al. Cybersecurity for SCADA Systems , 2006 .
[46] Khosrow Moslehi,et al. Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.
[47] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[48] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[49] Axel W. Krings,et al. A simple GSPN for modelling common mode failures in critical infrastructures , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[50] Shaobu Wang,et al. Identification of Vulnerable Lines in Power Grid Based on Complex Network Theory , 2007, 2007 IEEE Power Engineering Society General Meeting.
[51] S.D. Wolthusen,et al. GIS-based command and control infrastructure for critical infrastructure protection , 2005, First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05).
[52] Leonard L. Grigsby,et al. The Electric Power Engineering Handbook , 2000 .
[53] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[54] Y. Lai,et al. Attacks and cascades in complex networks , 2004 .
[55] David Mussington,et al. Concepts for Enhancing Critical Infrastructure Protection: Relating Y2K to CIP Research and Development , 2002 .
[56] Giovanni Ulivi,et al. An agent based simulator for critical interdependent infrastructures , 2004 .
[57] S. N. Dorogovtsev,et al. Evolution of networks with aging of sites , 2000, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[58] Olivier Gaudoin,et al. Modélisation aléatoire en fiabilité des logiciels , 2007 .
[59] H.M. Kim,et al. M-CI/sup 2/: modelling cyber interdependencies between critical infrastructures , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[60] Marek Zima,et al. Operation, Monitoring and Control Technology of Power Systems , 2007 .
[61] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[62] Chris W. Johnson,et al. Computational Support for Identifying Safety and Security Related Dependencies between National Critical Infrastructures , 2008 .
[63] Leonard L. Grigsby,et al. Power system stability and control , 2007 .
[64] Charles M. Macal,et al. Tutorial on agent-based modelling and simulation , 2005, Proceedings of the Winter Simulation Conference, 2005..
[65] R. Giovanini,et al. EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.
[66] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[67] V. E. Lynch,et al. Critical points and transitions in an electric power transmission model for cascading failure blackouts. , 2002, Chaos.
[68] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[69] V. Grimm. Ten years of individual-based modelling in ecology: what have we learned and what could we learn in the future? , 1999 .