Journal articles on the topic 'Power system vulnerability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Power system vulnerability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Bo, Da Hai You, and Xiang Gen Yin. "Research on Vulnerability Assessment System of Complicated Power System." Advanced Materials Research 204-210 (February 2011): 622–26. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.622.
Full textTeng, Jen-Hao, Ivan Curtis Martinez, and Chia-Yen Chen. "Utilising energy storage systems to mitigate power system vulnerability." IET Generation, Transmission & Distribution 7, no. 7 (July 1, 2013): 790–98. http://dx.doi.org/10.1049/iet-gtd.2012.0694.
Full textDoorman, G. L., K. Uhlen, G. H. Kjolle, and E. S. Huse. "Vulnerability Analysis of the Nordic Power System." IEEE Transactions on Power Systems 21, no. 1 (February 2006): 402–10. http://dx.doi.org/10.1109/tpwrs.2005.857849.
Full textLuo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He, and Hang Zhang. "Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology." Journal of Physics: Conference Series 2401, no. 1 (December 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.
Full textSun, Meng, Qi Wang, Jue He, Huailin Huang, Yu Huang, Xiaojie Shen, Yaohui Xiao, and Suchun Fan. "Research on automatic scanning method of network vulnerabilities in power system." Journal of Physics: Conference Series 2290, no. 1 (June 1, 2022): 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.
Full textPadhee, Malhar, Reetam Sen Biswas, Anamitra Pal, Kaustav Basu, and Arunabha Sen. "Identifying Unique Power System Signatures for Determining Vulnerability of Critical Power System Assets." ACM SIGMETRICS Performance Evaluation Review 47, no. 4 (April 30, 2020): 8–11. http://dx.doi.org/10.1145/3397776.3397779.
Full textSamanta, Shouvik Kumar, and Chandan Kumar Chanda. "Smart power grid vulnerability analysis in composite system through power grid modelling." International Journal of Applied Power Engineering (IJAPE) 10, no. 1 (March 1, 2021): 11. http://dx.doi.org/10.11591/ijape.v10.i1.pp11-20.
Full textHaidar, Ahmed M. A., Azah Mohamed ., and Aini Hussain . "New Method for Vulnerability Assessment of Power System." Journal of Applied Sciences 7, no. 6 (March 1, 2007): 841–47. http://dx.doi.org/10.3923/jas.2007.841.847.
Full textLopez-Lezama, Jesus M., Juan J. Cortina, and Nicolas Munoz Galeano. "Assessment of power system vulnerability using metaheuristic techniques." Contemporary Engineering Sciences 11, no. 24 (2018): 1165–84. http://dx.doi.org/10.12988/ces.2018.8399.
Full textKubacki, Krzysztof, Dariusz Siemieniako, and Linda Brennan. "Building positive resilience through vulnerability analysis." Journal of Social Marketing 10, no. 4 (June 27, 2020): 471–88. http://dx.doi.org/10.1108/jsocm-09-2019-0142.
Full textYulianto, B. A., I. G. Sudjatmiko, A. Octavian, and I. N. Putra. "A hybrid multi-criteria decision-making and system dynamics approach in vulnerability analysis of TNI-POLRI power." Decision Science Letters 11, no. 4 (2022): 455–72. http://dx.doi.org/10.5267/j.dsl.2022.6.004.
Full textZheng, Wei, Run Dong Ge, Wen Ying Liu, Dan Dan Zhu, and Hui Yong Li. "Vulnerability Assessment for Large-Scale Wind Farm." Advanced Materials Research 1070-1072 (December 2014): 279–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.279.
Full textEl-Sharkawi, Mohamed A. "Intelligent Techniques for Power Systems Vulnerability Assessment." Sultan Qaboos University Journal for Science [SQUJS] 7, no. 1 (June 1, 2002): 23. http://dx.doi.org/10.24200/squjs.vol7iss1pp23-29.
Full textFouad, A. A., Qin Zhou, and V. Vittal. "System vulnerability as a concept to assess power system dynamic security." IEEE Transactions on Power Systems 9, no. 2 (May 1994): 1009–15. http://dx.doi.org/10.1109/59.317643.
Full textLuo, Lingen, Bei Han, and Marti Rosas-Casals. "Network Hierarchy Evolution and System Vulnerability in Power Grids." IEEE Systems Journal 12, no. 3 (September 2018): 2721–28. http://dx.doi.org/10.1109/jsyst.2016.2628410.
Full textSanz, Fredy A., Juan M. Ramírez, and Rosa E. Correa. "Experimental design for a large power system vulnerability estimation." Electric Power Systems Research 121 (April 2015): 20–27. http://dx.doi.org/10.1016/j.epsr.2014.11.026.
Full textLi, Jianlan, and Shuhong Huang. "A vulnerability model for power system dynamic security assessment." International Journal of Electrical Power & Energy Systems 62 (November 2014): 59–65. http://dx.doi.org/10.1016/j.ijepes.2014.03.026.
Full textPiccinelli, Roberta, and Elisabeth Krausmann. "North Europe power transmission system vulnerability during extreme space weather." Journal of Space Weather and Space Climate 8 (2018): A03. http://dx.doi.org/10.1051/swsc/2017033.
Full textOyola-Yeroaiel, Arthur, and Jennifer Wilson. "Terrorism and System Failure: A Revisited Perspective of Current Development Paradigms." International Journal of Mass Emergencies & Disasters 21, no. 3 (November 2003): 25–40. http://dx.doi.org/10.1177/028072700302100303.
Full textGuo, Ran, Weijie Chen, Lejun Zhang, Guopeng Wang, and Huiling Chen. "Smart Contract Vulnerability Detection Model Based on Siamese Network (SCVSN): A Case Study of Reentrancy Vulnerability." Energies 15, no. 24 (December 19, 2022): 9642. http://dx.doi.org/10.3390/en15249642.
Full textLi, Yifan, Bo Wang, Hongxia Wang, Fuqi Ma, Hengrui Ma, Jiaxin Zhang, Yingchen Zhang, and Mohamed A. Mohamed. "An Effective Node-To-Edge Interdependent Network and Vulnerability Analysis for Digital Coupled Power Grids." International Transactions on Electrical Energy Systems 2022 (September 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/5820126.
Full textZhang, Meng, Liang HUA Zheng, Tao Lin, Hua Long Wang, and Fei Fang. "Pattern Recognition Based on Integrative Vulnerability Mode for Elcctric Power Grid." Applied Mechanics and Materials 291-294 (February 2013): 2212–16. http://dx.doi.org/10.4028/www.scientific.net/amm.291-294.2212.
Full textBasya, Fahmi, Mardi Hardjanto, and Ikbal Permana Putra. "SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)." Buana Information Technology and Computer Sciences (BIT and CS) 3, no. 1 (January 19, 2022): 1–4. http://dx.doi.org/10.36805/bit-cs.v3i1.2046.
Full textFan, Wen-Li, Quan-You Li, Ye-Qi Xiao, Xiao-Feng He, Yu-Ze Tong, Ping Hu, and Zhi-Bin Zeng. "Power system vulnerability analysis based on topological potential field theory." Physica Scripta 96, no. 12 (October 12, 2021): 125227. http://dx.doi.org/10.1088/1402-4896/ac2bda.
Full textPark, Hyunsoo. "Institutional Vulnerability and Power System Disturbances in the United States." International Review of Public Administration 17, no. 2 (August 2012): 63–92. http://dx.doi.org/10.1080/12294659.2012.10805228.
Full textAbedi, Amin, Ludovic Gaudard, and Franco Romerio. "Review of major approaches to analyze vulnerability in power system." Reliability Engineering & System Safety 183 (March 2019): 153–72. http://dx.doi.org/10.1016/j.ress.2018.11.019.
Full textRout, Gyanendra Kumar, Tamalika Chowdhury, and Chandan Kumar Chanda. "Betweenness as a Tool of Vulnerability Analysis of Power System." Journal of The Institution of Engineers (India): Series B 97, no. 4 (June 21, 2016): 463–68. http://dx.doi.org/10.1007/s40031-016-0222-z.
Full textAdachi, Takao, and Bruce R. Ellingwood. "Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability." Reliability Engineering & System Safety 93, no. 1 (January 2008): 78–88. http://dx.doi.org/10.1016/j.ress.2006.10.014.
Full textZhang, Haiyan, Minfang Peng, Josep M. Guerrero, Xingle Gao, and Yanchen Liu. "Modelling and Vulnerability Analysis of Cyber-Physical Power Systems Based on Interdependent Networks." Energies 12, no. 18 (September 6, 2019): 3439. http://dx.doi.org/10.3390/en12183439.
Full textHuang, Xun Cheng, Huan Qi, Xiao Pan Zhang, Li Fang Lu, and Yang Yu Hu. "Regional Vulnerability Analysis of Grid Structure." Applied Mechanics and Materials 419 (October 2013): 877–82. http://dx.doi.org/10.4028/www.scientific.net/amm.419.877.
Full textQu, Hui, Xing Xian, Shao Qian Ding, Shan Shan Wen, Tao Lin, and Fen Tao. "Research on Grid Structural Vulnerability Based on Improved Electrical Betweenness." Advanced Materials Research 1070-1072 (December 2014): 815–18. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.815.
Full textDeyuan, Tian, Liu Rushan, Xia Xuyi, and Wang Zhenhui. "Seismic Vulnerability Assessment of Thermal Power Plants Based on Beta Function." Mathematical Problems in Engineering 2022 (April 13, 2022): 1–10. http://dx.doi.org/10.1155/2022/5799241.
Full textKolosok, Irina, and Liudmila Gurina. "Assessment of risks due to cyberattacks on information and communication infrastructure of cyber-physical system in the electric power system control." E3S Web of Conferences 139 (2019): 01026. http://dx.doi.org/10.1051/e3sconf/201913901026.
Full textHuang, Da Wei, and Ran He. "Analysis of Power Grid Vulnerability Based on Electrical Dissection Method." Applied Mechanics and Materials 448-453 (October 2013): 2564–68. http://dx.doi.org/10.4028/www.scientific.net/amm.448-453.2564.
Full textWang, Tong, and Jing Ma. "Operation Betweenness Based Assessment on Overload Vulnerability." Applied Mechanics and Materials 373-375 (August 2013): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1378.
Full textLi, Yuancheng, and Shengnan Chu. "Construction and reduction methods of vulnerability index system In power SCADA." International Journal of Security and Its Applications 8, no. 6 (November 30, 2014): 335–52. http://dx.doi.org/10.14257/ijsia.2014.8.6.29.
Full textOuyang, Min, Min Xu, Chi Zhang, and Shitong Huang. "Mitigating electric power system vulnerability to worst-case spatially localized attacks." Reliability Engineering & System Safety 165 (September 2017): 144–54. http://dx.doi.org/10.1016/j.ress.2017.03.031.
Full textKamwa, I., A. K. Pradhan, G. Joos, and S. R. Samantaray. "Fuzzy Partitioning of a Real Power System for Dynamic Vulnerability Assessment." IEEE Transactions on Power Systems 24, no. 3 (August 2009): 1356–65. http://dx.doi.org/10.1109/tpwrs.2009.2021225.
Full textAnil, Ozgur, Sami Oguzhan Akbas, Erkan Kantar, and A. Cem Gel. "Vibration measurement and vulnerability analysis of a power plant cooling system." Smart Structures and Systems 11, no. 2 (February 25, 2013): 199–215. http://dx.doi.org/10.12989/sss.2013.11.2.199.
Full textArroyo, J. M. "Bilevel programming applied to power system vulnerability analysis under multiple contingencies." IET Generation, Transmission & Distribution 4, no. 2 (2010): 178. http://dx.doi.org/10.1049/iet-gtd.2009.0098.
Full textZhou, Ming, Jingyu Li, Shunyu Wu, Siwei Liu, Gengyin Li, and Jianqin Liu. "Vulnerability analysis of power system based on dynamic regional electrical coupling." International Transactions on Electrical Energy Systems 29, no. 1 (July 31, 2018): e2671. http://dx.doi.org/10.1002/etep.2671.
Full textNovakovskiy, B. A., A. I. Prasolova, A. M. Karpachevskiy, and O. G. Filippova. "Mapping of isolated energy system structure: case study of Kamchatka Territory, Magadan and Sakhalin Regions." Geodesy and Cartography 923, no. 5 (June 20, 2017): 56–63. http://dx.doi.org/10.22389/0016-7126-2017-923-5-56-63.
Full textLi, Ding, Shuang Ya Zhou, Shun Tao, Jia Jia Xue, and Xiang Ning Xiao. "Application of Common Information Model in Analyzing the Area of Vulnerability to Voltage Sags." Applied Mechanics and Materials 241-244 (December 2012): 747–51. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.747.
Full textLiu, Yanchen, Minfang Peng, Xingle Gao, and Haiyan Zhang. "Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures." Processes 9, no. 11 (November 8, 2021): 1994. http://dx.doi.org/10.3390/pr9111994.
Full textBielby, William T. "Minority Vulnerability in Privileged Occupations." ANNALS of the American Academy of Political and Social Science 639, no. 1 (December 15, 2011): 13–32. http://dx.doi.org/10.1177/0002716211422338.
Full textDu, Zhi, Gang Wang, Da Hai You, Wei Hua Chen, Ke Wang, and Yang Zou. "A Novel Transmission Line Vulnerability Evaluation Method Based on Complex Network Theory." Applied Mechanics and Materials 494-495 (February 2014): 1866–69. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1866.
Full textTapia, Mariela, Pablo Thier, and Stefan Gößling-Reisemann. "Building resilient cyber-physical power systems." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 29, no. 1 (April 1, 2020): 23–29. http://dx.doi.org/10.14512/tatup.29.1.23.
Full textAlonso, Monica, Jaime Turanzas, Hortensia Amaris, and Angel T. Ledo. "Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks." Sensors 21, no. 17 (August 30, 2021): 5826. http://dx.doi.org/10.3390/s21175826.
Full textChen, Yan, Yazhong Feng, Fan Zhang, and Lei Wang. "Assessing Water Resources Vulnerability by Using a Rough Set Cloud Model: A Case Study of the Huai River Basin, China." Entropy 21, no. 1 (December 24, 2018): 14. http://dx.doi.org/10.3390/e21010014.
Full textOmoroghomwan, A. E., S. O. Igbinovia, and F. O. Odiase. "Vulnerability Assessment of Components in a Typical Rural Nigerian Power Distribution System." March 2021 5, no. 1 (March 2021): 32–46. http://dx.doi.org/10.36263/nijest.2021.01.0237.
Full text