An AGC Reformulation for the Decomposed Security-Constrained ACOPF Problem.
Muhammad WaseemSaeed D. ManshadiPublished in: CoRR (2020)
Keyphrases
- security requirements
- information security
- security issues
- computer security
- security management
- access control
- intrusion detection
- security problems
- security policies
- data security
- functional requirements
- neural network
- high security
- security measures
- security threats
- cyber security
- countermeasures
- statistical databases
- risk assessment
- cyber attacks
- lower level
- low cost
- learning algorithm
- genetic algorithm
- database
- security vulnerabilities