Your selections:
Simulation of a power system with large renewable penetration
A review of false data injection attacks against modern power systems
- Liang, Gaoqi, Zhao, Junhua, Luo, Fengji, Weller, Steven R., Dong, Zhao Yang
A power flow based model for the analysis of vulnerability in power networks
- Wang, Zhuoyang, Chen, Guo, Hill, David J., Dong, Zhao Yang
- Xu, Yan, Zhang, Rui, Zhao, Junhua, Dong, Zhao Yang, Wang, Dianhui, Yang, Hongming, Wong, Kit Po
Advanced analysis methods for power system with high renewable penetrations
- Xu, Yan, Dai, Yuanyu, Dong, Zhao Yang, Zhang, Rui, Meng, Ke
Probabilistic load flow computation using first-order second-moment method
- Wan, Can, Xu, Zhao, Dong, Zhao Yang, Wong, Kit Po
A novel XML-based power resource modeling framework for power system heterogeneous data integrating
- Wan, Can, Dong, Zhaoyang, Luo, Fengji, Wang, Rui, Chen, Yingying, Meng, Ke, Wong, Kit-Po
Intelligent systems for power system dynamic security assessment: review and classification
- Zhang, Rui, Xu, Yan, Dong, Zhao Yang, Meng, Ke, Xu, Zhao
Are you sure you would like to clear your session, including search history and login status?