Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Load flow
biblio
Prototyping Self-Managed Interdependent Networks - Self-Healing Synergies against Cascading Failures
Submitted by aekwall on Mon, 03/25/2019 - 9:54am
self-managed interdependent networks
power system faults
power system interconnection
Power system protection
power system reliability
pubcrawl
public domain software
real-world interdependent networks
resilience
self-healing
self-healing mechanism
self-healing networks
self-healing synergies
power grids
self-management
self-management software systems
SFINA
simulation
simulation framework for intelligent network adaptations
Smart Grid
socio-economic effects
Software
software artifact
techno-socio-economic sectors
Unified modeling language
interdisciplinary scope
cascading failure
catastrophic instabilities
complex networks
composability
Computational modeling
digital society
distributed system
failure analysis
general prototyping approach
healer network
interdependent networks
interdependent power networks
Adaptation models
Load flow
Load modeling
modeling
modular design solution
multiplex networks
network interconnection
open source software extension
organizational constraints
power cascading failures
power engineering computing
power flow exchanges
biblio
Stochastic security-constrained generation expansion planning methodology based on a generalized line outage distribution factors
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
Stochastic computing
PTDF
pubcrawl
resilience
Resiliency
SC-GCEP problem
Scalability
security
security-constrained
security-constraint analysis modeling
pre-contingency constraints
Stochastic Computing Security
Stochastic processes
stochastic programming
stochastic security-constrained generation capacity expansion planning problem
transmission lines
two-stage multi-period framework
two-stage problem
uncertainty
optimization
K-means clustering technique
line outage distribution factors
Linear distribution factors
Load flow
Load modeling
load uncertainty
LODF
N-m post-contingency analysis
electrical power systems
partial transmission distribution factors
Planning
post-contingency constraints
post-contingency power flows
power generation
power generation planning
power system security
power systems
biblio
A generalized stochastic N-m security-constrained generation expansion planning methodology using partial transmission distribution factors
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
security-constrained analyses
power system security
power transmission economics
pubcrawl
resilience
Resiliency
Scalability
security
security criteria
security-constrained
power system reliability
Stochastic computing
Stochastic Computing Security
stochastic problem
Stochastic processes
stochastic programming
stochastic security-constrained generation capacity expansion planning problem
Transmission line matrix methods
two-stage problem
uncertainty
optimization
generalized stochastic N-m security-constrained generation expansion planning methodology
Generators
line outage distribution factors
Linear distribution factors
Load flow
Load modeling
load scenarios
multiple-line outages
optimisation
generalized generation distribution factors
optimization problem
partial transmission distribution factors
Planning
post-contingency constraints
power generation dispatch
power generation planning
power generation scheduling
power markets
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by el_wehby on Mon, 05/14/2018 - 4:07pm
physical power flow maximization
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
power system vulnerability evaluation
power system security
Polish system
Algorithm design and analysis
optimization
mixed-integer linear program
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
bi-level optimization problem
1449080
biblio
State Estimation Error Detection System for Online Dynamic Security Assessment
Submitted by grigby1 on Wed, 05/09/2018 - 2:50pm
Resiliency
power system monitoring
power system security
power system stability control
power system state estimation
power system transient stability
pubcrawl
Q measurement
remedial action schemes
resilience
power system
SCADA
SCADA systems
SE error detection system
security
state estimation
state estimation error detection system
supervisory control and data acquisition
Transient Stability
load shedding
DSA analysis
DSA assessment
Dynamic security assessment
dynamical system
electrical power system
generator shedding scheme
Human behavior
Hybrid power systems
Load flow
Compositionality
online dynamic security assessment
online-DSA
phasor measurement
Phasor measurement units
Phasor Measurements Units
PMU observation data
power flow value
Power measurement
biblio
Identifying security vulnerabilities of weakly detectable network parameter errors
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
measurement uncertainty
weakly detectable network parameter errors
weakly detectable network model parameter errors
vulnerability detection
security vulnerabilities identification
security
Resiliency
real-time systems
pubcrawl
Pricing
power systems
power system economics
power markets
power generation
network model parameters
Metrics
Compositionality
market security
locational marginal prices
Load flow
LMP
IEEE 14-bus system
Human behavior
gaussian distribution
financial tools
day-ahead markets
cyber security issues
CRR market calculations
CRR holders
Congestion Revenue Rights markets
congestion patterns
congestion charges
biblio
Vulnerability analysis and consequences of false data injection attack on power system state estimation
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
nonlinear system model
vulnerability detection
Vulnerability Analysis
state estimation
Resiliency
pubcrawl
power transmission lines
power system state estimation
power system security
physical line
optimization
AC state estimation
Metrics
Load modeling
Load flow
Limiting
Human behavior
FDI attack
false data injection attack
DC optimal power flow
Compositionality
bi-level optimization problem
biblio
False data injection attack in smart grid topology control: Vulnerability and countermeasure
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
smart power grids
pubcrawl
real power flow measurement
reliability perspectives
renewable energy sources
residue based bad data detection
Resiliency
security of data
Smart Grids
smart grid topology control
power system state estimation
stability check
state estimation
Substations
system control operation
Topology
topology control
Transient analysis
vulnerability detection
Metrics
Compositionality
Conferences
crucial factor
cyber security issue
false data injection attack
FDIA
Human behavior
IEEE 24 bus reliability test system
Load flow
AC state estimation
modern power system
online stability check result
physical system stability
power engineering computing
power flow measurement
power system reliability
power system security
power system stability
biblio
Security-constrained dynamic curtailment method for renewable energy sources in grid planning
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
power system planning
system security
Substations
smart grid security
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
branch outage
optimization
n-1 criteria
Metrics
Loading
Load flow
dynamic curtailment
contingency analysis
biblio
A Graph Model for Enhancing Situational Awareness in Power Systems
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Regression tree analysis
power grid operation
power grid security assessment
power grid vulnerability analysis
power grids
power system
power system faults
power system reliability
power system security
power transmission lines
power transmission reliability
pubcrawl
power flow information
Resiliency
security
Security analysis
security issues
situational awareness
system operator
system threats estimation
system threats visualization
Transmission line measurements
visualization
vulnerable links
Indexes
blackout threats
cascading outages
composability
contingency selection
critical links
Decision Making
graph model
graph theory
IEEE 118-bus systems
IEEE 30-bus systems
immediate threats graph
blackout
ITG
LCI
LDG
Line Criticality Index
line dependency graph
line outage impact prediction
Line Vulnerability Index
Load flow
LVI
Metrics
online visualization
« first
‹ previous
1
2
3
4
next ›
last »