This work is licensed under the Creative Commons Attribution 4.0 International License.
Xu, S., Xia, Y., & Shen, H. L. Analysis of malware-induced cyber attacks in cyber-physical power systems. IEEE Transactions on Circuits and Systems II: Express Briefs.,2020. 67(12):3482–3486XuS.XiaY.ShenH. L.Analysis of malware-induced cyber attacks in cyber-physical power systems2020671234823486Search in Google Scholar
Alayande, A. S., & Nwulu, N. A novel approach for the identification of critical nodes and transmission lines for mitigating voltage instability in power networks. African Journal of Science, Technology, Innovation and Development.,2019. 11(3):383–390AlayandeA. S.NwuluN.A novel approach for the identification of critical nodes and transmission lines for mitigating voltage instability in power networks2019113383390Search in Google Scholar
Wang, R., Sun, Q., Hu, W., Li, Y., Ma, D., & Wang, P. SoC-based droop coefficients stability region analysis of the battery for stand-alone supply systems with constant power loads. IEEE Transactions on Power Electronics.,2021. 36(7):7866–7879WangR.SunQ.HuW.LiY.MaD.WangP.SoC-based droop coefficients stability region analysis of the battery for stand-alone supply systems with constant power loads202136778667879Search in Google Scholar
Weng, S., Yue, D., & Dou, C. Secure distributed optimal frequency regulation of power grid with time-varying voltages under cyberattack. International Journal of Robust and Nonlinear Control.,2020. 30(3):894–909WengS.YueD.DouC.Secure distributed optimal frequency regulation of power grid with time-varying voltages under cyberattack2020303894909Search in Google Scholar
Xie, T., Liu, R. & Wei, Z. Improvement of the Fast Clustering Algorithm Improved by K-Means in the Big Data. Applied Mathematics and Nonlinear Sciences.,2020. 5(1): 1–10XieT.LiuR.WeiZ.Improvement of the Fast Clustering Algorithm Improved by K-Means in the Big Data202051110Search in Google Scholar
Mundewadi, R. & S, K. Numerical Solution of Abel’s Integral Equations using Hermite Wavelet. Applied Mathematics and Nonlinear Sciences.,2019. 4(2): 395–406MundewadiR.SK.Numerical Solution of Abel’s Integral Equations using Hermite Wavelet201942395406Search in Google Scholar
Piri, J., & Bandyopadhyay, G. A Client-/Server-Based Distributed DC Load Flow Technique Suitable for Online Monitoring of a Power System. Journal of The Institution of Engineers (India): Series B.,2020. 101(6):651–665PiriJ.BandyopadhyayG.A Client-/Server-Based Distributed DC Load Flow Technique Suitable for Online Monitoring of a Power System20201016651665Search in Google Scholar
Pan, H., Lian, H., Na, C., & Li, X. Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Based on Community Theory. IEEE Systems Journal.,2020. 14(3):3938–3948PanH.LianH.NaC.LiX.Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Based on Community Theory202014339383948Search in Google Scholar
Cavraro, G., Bernstein, A., Kekatos, V., & Zhang, Y. Real-time identifiability of power distribution network topologies with limited monitoring. IEEE Control Systems Letters.,2019. 4(2):325–330CavraroG.BernsteinA.KekatosV.ZhangY.Real-time identifiability of power distribution network topologies with limited monitoring201942325330Search in Google Scholar
Chen, D., Wan, C., Song, Y., Liu, H., & Wang, F. N-1 security-constrained coordinated scheduling of integrated electricity and natural gas system considering gas dynamics and wind power uncertainty. IET Renewable Power Generation.,2021. 15(7):1408–1421ChenD.WanC.SongY.LiuH.WangF.N-1 security-constrained coordinated scheduling of integrated electricity and natural gas system considering gas dynamics and wind power uncertainty202115714081421Search in Google Scholar
Du, D., Chen, R., Li, X., Wu, L., Zhou, P., & Fei, M. Malicious data deception attacks against power systems: A new case and its detection method. Transactions of the Institute of Measurement and Control.,2019. 41(6):1590–1599DuD.ChenR.LiX.WuL.ZhouP.FeiM.Malicious data deception attacks against power systems: A new case and its detection method201941615901599Search in Google Scholar