Accesso libero

Context-aware early warning method for monitoring business flow anomalies in transmission grid construction based on context-awareness

,  e   
05 nov 2024
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Wang, D., Wang, X., Zhang, Y., & Jin, L. (2019). Detection of power grid disturbances and cyber-attacks based on machine learning. Journal of information security and applications, 46, 42-52. Search in Google Scholar

Jones, L. E. (2017). Renewable energy integration: practical management of variability, uncertainty, and flexibility in power grids. Academic press. Search in Google Scholar

Shi, Z., Yao, W., Li, Z., Zeng, L., Zhao, Y., Zhang, R., ... & Wen, J. (2020). Artificial intelligence techniques for stability analysis and control in smart grids: Methodologies, applications, challenges and future directions. Applied Energy, 278, 115733. Search in Google Scholar

Wang, B., Fang, B., Wang, Y., Liu, H., & Liu, Y. (2016). Power system transient stability assessment based on big data and the core vector machine. IEEE Transactions on Smart Grid, 7(5), 2561-2570. Search in Google Scholar

Chin, W. L., Li, W., & Chen, H. H. (2017). Energy big data security threats in IoT-based smart grid communications. IEEE Communications Magazine, 55(10), 70-75. Search in Google Scholar

Pan, S., Morris, T., & Adhikari, U. (2015). Developing a hybrid intrusion detection system using data mining for power systems. IEEE Transactions on Smart Grid, 6(6), 3104-3113. Search in Google Scholar

Zhao, J., Zhang, G., La Scala, M., Dong, Z. Y., Chen, C., & Wang, J. (2015). Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Transactions on Smart Grid, 8(4), 1580-1590. Search in Google Scholar

Ashok, A., Govindarasu, M., & Wang, J. (2017). Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid. Proceedings of the IEEE, 105(7), 1389-1407. Search in Google Scholar

Márquez-Chamorro, A. E., Resinas, M., & Ruiz-Cortés, A. (2017). Predictive monitoring of business processes: a survey. IEEE Transactions on Services Computing, 11(6), 962-977. Search in Google Scholar

Zhang, Y., Xu, Y., Dong, Z. Y., Xu, Z., & Wong, K. P. (2017). Intelligent early warning of power system dynamic insecurity risk: Toward optimal accuracy-earliness tradeoff. IEEE Transactions on Industrial Informatics, 13(5), 2544-2554. Search in Google Scholar

Van der Werf Jan Martijn E.M., Rivkin Andrey, Montali Marco, Polyvyanyy Artem, Bernardinello Luca, Kleijn Jetty & Petrucci Laure. (2024). Correctness Notions for Petri Nets with Identifiers. Fundamenta Informaticae(2-4),159-207. Search in Google Scholar

Adriano Augusto, Raffaele Conforti, Marlon Dumas, Marcello La Rosa & Artem Polyvyanyy. (2019). Split miner: automated discovery of accurate and simple business process models from event logs. Knowledge and Information Systems(2),251-284. Search in Google Scholar

Harry Oviedo. (2023). Proximal Point Algorithm with Euclidean Distance on the Stiefel Manifold. Mathematics(11). Search in Google Scholar

Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro