2015 IEEE PES Innovative Smart Grid Technologies Latin America (ISGT LATAM) 2015
DOI: 10.1109/isgt-la.2015.7381238
|View full text |Cite
|
Sign up to set email alerts
|

A model-free voltage stability security assessment method using artificial intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Cybersecurity defenses are put in place to counteract three categories of attacks: conventional attacks that make use of well-known weaknesses, sophisticated attacks that exploit complex flaws, and emerging attacks that exploit newly discovered weaknesses. The information system has infiltrated several aspects of the company, such as the production, operation, and management departments (Bastos, & Martini, 2015). These advancements entail the need for reliable information security policies and solutions.…”
Section: Introductionmentioning
confidence: 99%
“…Cybersecurity defenses are put in place to counteract three categories of attacks: conventional attacks that make use of well-known weaknesses, sophisticated attacks that exploit complex flaws, and emerging attacks that exploit newly discovered weaknesses. The information system has infiltrated several aspects of the company, such as the production, operation, and management departments (Bastos, & Martini, 2015). These advancements entail the need for reliable information security policies and solutions.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber Security defenses are carried in concern for common attacks (manipulating known vulnerabilities), advanced attacks (abusing complex vulnerabilities) and emerging attacks (new attacks vulnerabilities). The information system has entered into various aspects of the organization such as production, operation, and management departments [3]. These advancements require the need for reliable information security techniques and systems.…”
Section: Introductionmentioning
confidence: 99%