{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T04:33:00Z","timestamp":1720413180925},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2011,6,1]],"date-time":"2011-06-01T00:00:00Z","timestamp":1306886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/tr.2011.2135490","type":"journal-article","created":{"date-parts":[[2011,4,26]],"date-time":"2011-04-26T14:23:43Z","timestamp":1303827823000},"page":"394-403","source":"Crossref","is-referenced-by-count":49,"title":["Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach"],"prefix":"10.1109","volume":"60","author":[{"given":"Claudio M.","family":"Rocco","sequence":"first","affiliation":[]},{"given":"Jose Emmanuel","family":"Ramirez-Marquez","sequence":"additional","affiliation":[]},{"given":"Daniel E.","family":"Salazar","sequence":"additional","affiliation":[]},{"given":"Cesar","family":"Yajure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"he","year":"2005","journal-title":"Applied Mathematics for Restructured Power Systems Optimization Control and Computational Intelligence"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.555"},{"key":"ref33","author":"salmern","year":"2003","journal-title":"Optimizing electric grid design under asymmetric threat"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.06.008"},{"key":"ref31","article-title":"Solving the network interdiction problem with genetic algorithms","author":"dai","year":"2002","journal-title":"Proceedings of the Fourth Asia-Pacific Conference on Industrial Engineering and Management System"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0895-7177(93)90236-R"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2005.851698"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.846198"},{"key":"ref35","author":"salmern","year":"2004","journal-title":"Optimizing Electric Grid Design Under Asymmetric Threat (II)"},{"key":"ref34","author":"lvarez","year":"2004","journal-title":"Interdicting electrical power grids"},{"key":"ref28","author":"helmbold","year":"1971","journal-title":"A counter capacity network interdiction model"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800170302"},{"key":"ref29","author":"boyle","year":"1988","journal-title":"Partial Enumeration for Planar Network Interdiction Problems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.06.003"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1111\/j.1539-6924.2005.00595.x","article-title":"A screening methodology for the identification and ranking of infrastructures vulnerability due to terrorism","volume":"25","author":"apostolakis","year":"2005","journal-title":"Risk Analysis"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1142\/S1793005709001416","article-title":"Increasing infrastructure resilience through competitive coevolution","volume":"5","author":"travis","year":"2009","journal-title":"New Mathematics and Natural Computation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2005.1560502"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.350"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825888"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.919243"},{"key":"ref26","author":"durbin","year":"1966","journal-title":"An interdiction model of highway transportation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1287\/opre.12.6.934"},{"key":"ref50","first-page":"283","article-title":"PESA-II: Region-based Selection in Evolutionary Multiobjective Optimization","author":"corne","year":"2001","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2008.705.713"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10732-009-9108-4"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.10.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2005.05.013"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.03.008"},{"key":"ref54","article-title":"A multiple-objective approach for the vulnerability assessment of infrastructure networks","author":"rocco","year":"2009","journal-title":"Proceedings of the European Safety and Reliability Conference"},{"key":"ref53","article-title":"Multiple-objective deterministic network interdiction using evolutionary algorithms","author":"rocco","year":"2009","journal-title":"Proceedings Annual Reliability and Maintainability Symposium"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.1597059"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2006)132:4(211)"},{"key":"ref11","first-page":"162","article-title":"Generation of terrorist scenarios for water distribution systems: an evolutionary computation approach","author":"wadda","year":"2004","journal-title":"Proceedings of the workshop Critical Infrastructure Protection Project"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/eej.4391160209"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.889080"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2006.00791.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.08.011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-7728-7"},{"key":"ref16","author":"wood","year":"1996","journal-title":"Power Generation Operation and Control"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-1346-3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/59.852155"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(97)01155-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.10.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.10.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.03.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.884599"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00055"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.10.007"},{"key":"ref49","first-page":"95","article-title":"SPEA2: Improving the strength pareto evolutionary algorithm","author":"zitzler","year":"2001","journal-title":"Proceedings of Evolutionary Methods for Design Optimization and Control with Applications to Industrial Problems"},{"key":"ref9","first-page":"881","article-title":"Protecting infrastructures from strategic attackers","volume":"1","author":"hausken","year":"2007","journal-title":"Risk Reliability and Societal Safety"},{"key":"ref46","article-title":"Controlling power flow using FACTS devices and the max-flow algorithm","author":"armbruster","year":"2002","journal-title":"Proceedings of the International Conference on Power Systems and Control"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2005.1560505"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-009-0005-7"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359618"},{"key":"ref42","author":"bertsekas","year":"1992","journal-title":"Linear Network Optimization Algorithms and Codes"},{"key":"ref41","author":"ford","year":"1962","journal-title":"Flows in Networks"},{"key":"ref44","article-title":"Influence of the topology on the power flux of the Italian high-voltage electrical network","author":"rosato","year":"2010","journal-title":"Europhysics Letters"},{"key":"ref43","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/24\/5779932\/05753983.pdf?arnumber=5753983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:12Z","timestamp":1633909932000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5753983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":59,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2011.2135490","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6]]}}}