Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Boda Li"'
Publikováno v:
Energy Reports, Vol 8, Iss , Pp 1404-1413 (2022)
Mobile emergency generators(MEGs) can accelerate disaster recovery and enhance the resiliency of the distribution system (SD). However, the resilience-oriented planning of MEGs has not been fully investigated. This paper proposes a method to achieve
Externí odkaz:
https://doaj.org/article/e88f0492f50d4bab8b995d3b5863985f
Publikováno v:
Engineering, Vol 9, Iss , Pp 13-16 (2022)
Externí odkaz:
https://doaj.org/article/1bd388a8864e4d50a358406eb1179ef9
Publikováno v:
IEEE Access, Vol 7, Pp 178605-178617 (2019)
Through virus-based reconnaissances, the attacker may compromise critical power substations and induce power outages. Meanwhile, the power system operator may conduct defensive measures to prevent virus-spreading. In this paper, a graphical evolution
Externí odkaz:
https://doaj.org/article/6af9be954951493e9951021099d1001c
Autor:
Boda Li, Qianwen Xu
Publikováno v:
IEEE Transactions on Power Systems. :1-14
Publikováno v:
ACS ES&T Water. 2:2590-2601
Publikováno v:
IEEE Systems Journal. 16:2753-2764
Recent advances in sensing, electronic, processing, machine learning, and communication technologies are accelerating the development of assisted and automated functions for commercial vehicles. Environmental perception sensor data are processed to g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::82d17381d00a099ddd8f7ff39e9da5e5
https://doi.org/10.36227/techrxiv.23047412
https://doi.org/10.36227/techrxiv.23047412
Publikováno v:
IEEE Transactions on Smart Grid. 13:1938-1951
Publikováno v:
IEEE Transactions on Power Systems. 37:530-542
Since modern smart grids have various and deeply coupled cyber-physical components, they are vulnerable to malicious cyber attacks. Although regular defenses including firewall and IDS are deployed, they may be weakened by zero-day vulnerabilities an
Publikováno v:
IEEE Transactions on Power Systems. 37:377-387
Since modern cyber-physical power systems are vulnerable to coordinated wide-area cyber attacks, it is necessary to mitigate the potential risk as much as possible. At the planning stage, the defender can utilize software diversity, which is a common