2015 American Control Conference (ACC) 2015
DOI: 10.1109/acc.2015.7171101
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing vulnerability of electricity distribution networks to DER disruptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…These features, which will be described in the text, include callbacks for in-memory bidirectional communication with branch-and-bound solvers, automatic differentiation of user-defined nonlinear functions, and easy-to-develop add-ons for specialized problem classes such as robust optimization. JuMP's unique mix of functionality has driven growing adoption by researchers [7,34,49,72,46], and JuMP and has been used for teaching in courses in at least 10 universities (e.g., [25]). In this paper, we will highlight both the important technical and usability aspects of JuMP, including how JuMP itself uses the advanced features of Julia.…”
mentioning
confidence: 99%
“…These features, which will be described in the text, include callbacks for in-memory bidirectional communication with branch-and-bound solvers, automatic differentiation of user-defined nonlinear functions, and easy-to-develop add-ons for specialized problem classes such as robust optimization. JuMP's unique mix of functionality has driven growing adoption by researchers [7,34,49,72,46], and JuMP and has been used for teaching in courses in at least 10 universities (e.g., [25]). In this paper, we will highlight both the important technical and usability aspects of JuMP, including how JuMP itself uses the advanced features of Julia.…”
mentioning
confidence: 99%
“…For this, theoretical constructs from Stackelberg games are applied. Although Stackelberg games have been used in the literature in the context of energy management [17] and vulnerability analysis [18], this is the first time these are being effectively utilized for attack planning.…”
Section: A Attack Planning Via Stackelberg Gamesmentioning
confidence: 99%