A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods. Zhang, J., Jaipuria, P., Chakrabortty, A., & Hussain, A. In International Conference on Decision and Game Theory for Security, pages 350–359, 2014. Springer, Cham. bibtex @inproceedings{zhang2014distributed,
title={A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods},
author={Zhang, Jianhua and Jaipuria, Prateek and Chakrabortty, Aranya and Hussain, Alefiya},
booktitle={International Conference on Decision and Game Theory for Security},
pages={350--359},
year={2014},
organization={Springer, Cham}
}
Downloads: 0
{"_id":"HnFMzDKdNHMCGJkZi","bibbaseid":"zhang-jaipuria-chakrabortty-hussain-adistributedoptimizationalgorithmforattackresilientwideareamonitoringofpowersystemstheoreticalandexperimentalmethods-2014","author_short":["Zhang, J.","Jaipuria, P.","Chakrabortty, A.","Hussain, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods","author":[{"propositions":[],"lastnames":["Zhang"],"firstnames":["Jianhua"],"suffixes":[]},{"propositions":[],"lastnames":["Jaipuria"],"firstnames":["Prateek"],"suffixes":[]},{"propositions":[],"lastnames":["Chakrabortty"],"firstnames":["Aranya"],"suffixes":[]},{"propositions":[],"lastnames":["Hussain"],"firstnames":["Alefiya"],"suffixes":[]}],"booktitle":"International Conference on Decision and Game Theory for Security","pages":"350–359","year":"2014","organization":"Springer, Cham","bibtex":"@inproceedings{zhang2014distributed,\n title={A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods},\n author={Zhang, Jianhua and Jaipuria, Prateek and Chakrabortty, Aranya and Hussain, Alefiya},\n booktitle={International Conference on Decision and Game Theory for Security},\n pages={350--359},\n year={2014},\n organization={Springer, Cham}\n}\n\n","author_short":["Zhang, J.","Jaipuria, P.","Chakrabortty, A.","Hussain, A."],"key":"zhang2014distributed","id":"zhang2014distributed","bibbaseid":"zhang-jaipuria-chakrabortty-hussain-adistributedoptimizationalgorithmforattackresilientwideareamonitoringofpowersystemstheoreticalandexperimentalmethods-2014","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/uSgGsMFbmzvnxH3jd","dataSources":["uEAyrHFr7um3TKFoo","nS5AfGYkuXvt2n4JJ"],"keywords":[],"search_terms":["distributed","optimization","algorithm","attack","resilient","wide","area","monitoring","power","systems","theoretical","experimental","methods","zhang","jaipuria","chakrabortty","hussain"],"title":"A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods","year":2014}