Adversarial optimization leads to over-optimistic security-constrained dispatch, but sampling can help.
Charles DawsonChuchu FanPublished in: CoRR (2023)
Keyphrases
- concave convex procedure
- random sampling
- optimization process
- global optimization
- multi agent
- optimization algorithm
- information security
- data sets
- statistical databases
- access control
- information assurance
- computer security
- functional requirements
- optimization model
- security policies
- constrained optimization
- active learning
- sampling algorithm
- network security
- security mechanisms
- optimization methods
- cyber security
- optimization problems
- distributed systems