CORE
šŗš¦Ā
Ā make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
2 research outputs found
Biālevel modelling of false data injection attacks on security constrained optimal power flow
Author
Anupam Joshi
Bijaya Ketan Panigrahi
+4Ā more
Kush Khanna
Liu X.
Mohsenian.Rad A.H.
Yumbla P.E.O.
Publication venue
'Institution of Engineering and Technology (IET)'
Publication date
Field of study
No full text
Crossref
Sequential analysis of optimal transmission switching with contingency assessment
Author
Aazami R.
Bakirtzis A.
+6Ā more
Elsaiah S.
Mehrdad Tarafdar Hagh
Milad Zamani Gargari
Mir Jalal Vahid Pakdel
Wood A.J.
Yumbla P.E.O..
Publication venue
'Institution of Engineering and Technology (IET)'
Publication date
Field of study
No full text
Crossref