Search

Your search keyword '"Power system security"' showing total 684 results

Search Constraints

Start Over You searched for: Descriptor "Power system security" Remove constraint Descriptor: "Power system security" Publisher ieee Remove constraint Publisher: ieee
684 results on '"Power system security"'

Search Results

1. Review of Data-Driven Techniques for On-Line Static and Dynamic Security Assessment of Modern Power Systems

2. An Enhanced Performance Evaluation Metrics for Wind Power Ramp Event Forecasting

3. Suspension of Australian National Electricity Market in 2022 Necessitates Mechanism Evolution Ensuring Power Supply Security

4. Data-driven Approach for State Prediction and Detection of False Data Injection Attacks in Smart Grid

5. System Scheduling With Optimal Time-Varying Delivery Intervals for Frequency Response.

6. A Ground Fault Location Method for DC Systems Through Multiple Grounding Connections.

7. Profit-Oriented False Data Injection Attack Against Wind Farms and Countermeasures.

8. Preventing Outages Under Coordinated Cyber–Physical Attack With Secured PMUs.

9. Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids.

10. A Distributionally Robust Scheme for Critical Component Identification to Bolster Cyber-Physical Resilience of Power Systems.

11. Power Flow Computation Under k -Line Removal.

12. Transmission of Frequency Balance Instructions and Secure Data Sharing Based on Chaos Encryption in Smart Grid-Based Energy Systems Applications

13. The Virtualized Cyber-Physical Testbed for Machine Learning Anomaly Detection: A Wind Powered Grid Case Study

14. Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks.

15. A Coalitional Cyber-Insurance Design Considering Power System Reliability and Cyber Vulnerability.

16. Mitigation of Saturated Cut-Sets During Multiple Outages to Enhance Power System Security.

17. Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective

18. Power System Security With Cyber-Physical Power System Operation

19. Methodological Approach for Defining Frequency Related Grid Requirements in Low-Carbon Power Systems

20. Optimal Distribution of Power Grid Under-Frequency Load Shedding With Security Considerations.

21. Scalable Security-Constrained Unit Commitment Under Uncertainty via Cone Programming Relaxation.

22. Stealthy Black-Box Attacks on Deep Learning Non-Intrusive Load Monitoring Models.

23. Research on Discharging Current Distribution of Grounding Electrodes

24. Enabling Model-Based LTI for Large-Scale Power System Security Monitoring and Enhancement With Graph-Computing-Based Power Flow Calculation

25. Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures

26. Enhancing Event-Driven Load Shedding by Corrective Switching With Transient Security and Overload Constraints

27. Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service

28. Non-linear state recovery in power system under bad data and cyber attacks

29. Power System Frequency Security Index Considering All Aspects of Frequency Profile.

30. Sparse Oblique Decision Tree for Power System Security Rules Extraction and Embedding.

31. Qualitative Assessment of Power Swing for Enhancing Security of Distance Relay in a TCSC-Compensated Line.

32. Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation.

33. DC is the Future [Point of View].

34. Privacy-Preserving Power System Obfuscation: A Bilevel Optimization Approach.

35. Differential Privacy for Power Grid Obfuscation.

36. Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security.

37. An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks.

38. Security-Based Active Demand Response Strategy Considering Uncertainties in Power Systems

39. Intra-Interval Security Assessment in Power Systems With High Wind Penetration.

40. Manipulating Residents’ Behavior to Attack the Urban Power Distribution System.

41. Software-Defined Microgrid Control for Resilience Against Denial-of-Service Attacks.

42. A Review of Power System Flexibility With High Penetration of Renewables.

43. An Improved Defender–Attacker–Defender Model for Transmission Line Defense Considering Offensive Resource Uncertainties.

44. GridCloud: Infrastructure for Cloud-Based Wide Area Monitoring of Bulk Electric Power Grids.

45. Financially Motivated FDI on SCED in Real-Time Electricity Markets: Attacks and Mitigation.

46. A Novel Data Integrity Attack on Consensus-Based Distributed Energy Management Algorithm Using Local Information.

47. Securing the Precision Time Protocol (PTP) Against Fake Timestamps.

48. A Control-Oriented Energy Function for Generation Shedding Determination for Transient Stability Control.

49. A Linear Game Framework for Defending Power Systems Against Intelligent Physical Attacks.

50. Development of an Equivalent Circuit of a Large Power System for Real-Time Security Assessment.

Catalog

Books, media, physical & digital resources