- N. Alguacil, A. Delgadillo, and J. M. Arroyo, “A Trilevel Programming Approach for Electric Grid Defense Planning,” Comput. Oper. Res., vol. 41, pp. 282–290, 2014.##
- G. Brown, M. Carlyle, J. Salmerón, and K. Wood, “Defending Critical Infrastructure,” Interfaces, vol. 36, pp. 530–544, 2006.##
- G. Chen, Z. Y. Dong, D. J. Hill, Y. S. Xue, “Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks,” IEEE Trans. Power Syst., vol. 26, pp. 1000–1009, 2011.##
- A. J. Holmgren, E. Jenelius, and J. Westin, “Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks,” IEEE Trans. Power Syst., vol. 22, pp. 76–84, 2007.##
- M. Carrión, J. M. Arroyo, and N. Alguacil, “Vulnerability-Constrained Transmission Expansion Planning: A Stochastic Programming Approach,” IEEE Trans. Power Syst., vol. 22, pp. 1436–1445, 2007.##
- M. P. Scaparra and R. L. Church, “A Bilevel Mixed-Integer Program for Critical Infrastructure Protection Planning,” Comput. Oper. Res., vol. 35, pp. 1905–1923, 2008.##
- R. Powell, “Defending Against Strategic Terrorists over the Long Run: a Basic Approach to Resource Allocation,” Working Paper, University of California, Travers Department of Political Science, Berkeley, 2006.##
- G. Levitin, “Optimal Defense Strategy Against Intentional Attacks,” IEEE Trans. Reliab., vol. 56, pp. 148–157, 2007.##
- V. Bier, “Game-Theoretic and Reliability Methods in Counterterrorism and Security,” Statistical Methods in Counterterrorism, pp. 23–40, 2006.##
- E. Kardes and R. Hall, “Survey of Literature on Strategic Decision Making in the Presence of Adversaries,” Nonpublished Research Reports, vol. 115, 2005.##
- N. Romero, N. Xu, L. K. Nozick, I. Dobson, and D. Jones, “Investment Planning for Electric Power Systems under Terrorist Threat,” IEEE Trans. Power Syst., vol. 27, pp. 108–116, 2012.##
- R. W. Rose, “Defending Electrical Power Grids,” M.Sc. Thesis, Naval Postgraduate School, Monterey, CA, 2007.##
- D. L. Alderson, G. G. Brown, W. M. Carlyle, and R. K. Wood, “Solving Defender-Attacker-Defender Models for Infrastructure Defense,” In Informs Computing Society Conference, pp. 28-49, 2011.##
- W. Yuan, L. Zhao, and B. Zeng, “Optimal Power Grid Protection through a Defender–Attacker–Defender Model,” Reliab. Eng. Syst. Saf., vol. 121, pp. 83–89, 2014.##
- Y. Yao, T. Edmunds, D. Papageorgiou, and R. Alvarez, “Trilevel Optimization In Power Network Defense,” IEEE Trans. Syst. Man, Cybern, vol. 37, pp. 712–718, 2007.##
- J. Salmeron, K. Wood, and R. Baldick, “Analysis of Electric Grid Security under Terrorist Threat,” IEEE Trans. Power Syst., vol. 19, pp. 905–912, 2004.##
- A. L. Motto, J. M. Arroyo, and F. D. Galiana, “A Mixed-Integer LP Procedure for the Analysis of Electric Grid Security under Disruptive Threat,” IEEE Trans. Power Syst., vol. 20, pp. 1357–1365, 2005.##
- J. M. Arroyo and F. D. Galiana, “On the Solution of the Bilevel Programming Formulation of the Terrorist Threat Problem,” IEEE Trans. Power Syst., vol. 20, pp. 789–797, 2005.##
- M. Chertoff, “Remarks for Secretary Michael Chertoff, US Department of Homeland Security, George Washington University Homeland Security Policy Institute,” Georg. Washingt. Univ. Washington, DC, 2005.##
- M. G. F. Bell, “The Use Of Game Theory To Measure The Vulnerability Of Stochastic Networks,” IEEE Trans. Reliab, vol. 52, pp. 63–68, 2003.##
- H. H. Willis, A. R. Morral, T. K. Kelly, and J. J. Medby, “Estimating Terrorism Risk,” Rand Corporation, 2006.##
- N. J. Rabkin, “Strengthening the Use of Risk Management Principles in Homeland Security Risk Management,” U. S. Government Accountability Office, 2008.##
- DHS, “The 2009 National Infrastructure Protection Plan,” Department of Homeland Security, 2009.##
- G. W. Bush, “The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets,” Nonpublished Research Reports, 2003.##
- R. E. Alvarez, “Interdicting electrical power grids,” M. Sc. Thesis, Naval Postgraduate School, Monterey, CA, 2004.##
- J. M. Arroyo, “Bilevel Programming Applied To Power System Vulnerability Analysis under Multiple Contingencies,” IET Gener. Transm. Distrib., vol. 4, pp. 178–190, 2010.##
- E. Israeli and R. K. Wood, “Shortest‐Path Network Interdiction,” Networks, vol. 40, pp. 97–111, 2002.##
- K. J. Cormican, D. P. Morton, and R. K. Wood, “Stochastic Network Interdiction,” Oper. Res., 46, pp. 184–197, 1998.##
- D. P. Morton, F. Pan, and K. J. Saeger, “Models for Nuclear Smuggling Interdiction,” IIE Trans., vol. 39, pp. 3–14, 2007.##
26. A. J. Wood and B. F. Wollenberg, “Power Generation, Operation, and Control,” John Wiley & Sons, 2012.##
|