Reference: | Reference
[1] Chen, Jie, J. Thorp, and Manu Parashar. "Analysis of electric power system disturbance data." 2013 46th Hawaii International Conference on System Sciences. Vol. 2. IEEE Computer Society, 2001.
[2] U. S. C. p. s. o. t. force, "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004.
[3] Glanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.
[4] D. N. Kosterev, et al., "Model validation for the August 10, 1996 WSCC system outage," IEEE Transactions on Power Systems, vol. 14, pp. 967-974, Aug 1999
[5] Wong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.
[6] Strogatz, S. H. (2001). "Exploring complex networks." Nature 410: 268-276.
[7] M.E.J Newman, Networks : an introduction, Oxford University Press, Oxford; New York, 2010
[8] Brandes, Ulrik. "A faster algorithm for betweenness centrality*." Journal of Mathematical Sociology 25.2 (2001): 163-177.
[9] Erdős, P., and A. Rényi. "On the evolution of random graphs." Selected Papers of Alfréd Rényi, vol 2 (1976): 482-525.
[10] Barabási, Albert-László, and Réka Albert. "Emergence of scaling in random networks." science 286.5439 (1999): 509-512.
[11] Latora, V. and M. Marchiori (2001). "Efficient Behavior of Small-World Networks." Physical Review Letters 87.
[12] Eusgeld, I., et al. (2009). "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures." Reliability Engineering and System Safety 94: 954-963.
[13] Motter, A. E. and Y.-C Lai (2002). "Cascade-based attacks on complex networks. " Physical Review E 66(065102)
[14] Crucitti, Paolo, et al. "Error and attack tolerance of complex networks." Physica A: Statistical Mechanics and its Applications 340.1 (2004): 388-394.
[15] Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)
[16] S. Tamronglak, “Analysis of power system disturbances due to relay hidden failures,” Ph.D. dissertation, Virginia Polytechnic Institute State Univ., Blacksburg, 1994.
[17] J. Chen, J. Thorp, I. Dobson, Electrical Power & Energy Systems 27 (2005) 318
[18] Simonsen, I., et al. (2008). "Transient Dynamics Increasing Network Vulnerability to Cascading Failures." Physical Review Letters 100.
[19] Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.
[20] S. Arianos, E. Bompard, A. Carbone, F. Xue, Power grid vulnerability: a complex network approach, Chaos, 19(2009)013119.
[21] Wang, Jiaoe, et al. "Exploring the network structure and nodal centrality of China’s air transport network: A complex network approach." Journal of Transport Geography 19.4 (2011): 712-721.
[22] Crucitti, Paolo, Vito Latora, and Massimo Marchiori. "Model for cascading failures in complex networks." Physical Review E 69.4 (2004): 045104.
[23] Kinney, Ryan, et al. "Modeling cascading failures in the North American power grid." The European Physical Journal B-Condensed Matter and Complex Systems 46.1 (2005): 101-107.
[24] Goh, K-I., B. Kahng, and D. Kim. "Universal behavior of load distribution in scale-free networks." Physical Review Letters 87.27 (2001): 278701.
[25] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145.
[26] Liu, Y. H. (2012). Computational large-scale complex networks : competition network and power grid. Applied Physics, National Chengchi University.
[27] Yi, C. K. (2013). Group-based vulnerability analyses on power grid and associated protection strategies against cascading failures. Applied Physics, National Chengchi University. |