<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1692-3324</journal-id>
<journal-title><![CDATA[Revista Ingenierías Universidad de Medellín]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. ing. univ. Medellín]]></abbrev-journal-title>
<issn>1692-3324</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Medellín]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1692-33242021000100099</article-id>
<article-id pub-id-type="doi">10.22395/rium.v20n38a6</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Assessing the Vulnerability of Power Systems Using Multilevel Programming: A Literature Review]]></article-title>
<article-title xml:lang="es"><![CDATA[Evaluación de la vulnerabilidad de sistemas eléctricos por medio de programación multinivel: una revisión bibliográfica]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hernández-Valencia]]></surname>
<given-names><![CDATA[Juan Pablo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López-Lezama]]></surname>
<given-names><![CDATA[Jesús María]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Restrepo-Cuestas]]></surname>
<given-names><![CDATA[Bonie Johana]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Tecnológico Metropolitano  ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de Antioquia  ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Instituto Tecnológico Metropolitano  ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>20</volume>
<numero>38</numero>
<fpage>99</fpage>
<lpage>117</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1692-33242021000100099&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1692-33242021000100099&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1692-33242021000100099&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Vulnerability studies can identify critical elements in electric power systems in order to take protective measures against possible scenarios that may result in load shedding, which can be caused by natural events or deliberate attacks. This article is a literature review on the latter kind, i.e., the interdiction problem, which assumes there is a disruptive agent whose objective is to maximize the damage to the system, while the network operator acts as a defensive agent. The non-simultaneous interaction of these two agents creates a multilevel optimization problem, and the literature has reported several interdiction models and solution methods to address it. The main contribution of this paper is presenting the considerations that should be taken into account to analyze, model, and solve the interdiction problem, including the most common solution techniques, applied methodologies, and future studies. This literature review found that most research in this area is focused on the analysis of transmission systems considering linear approximations of the network, and a few interdiction studies use an AC model of the network or directly treat distribution networks from a multilevel standpoint. Future challenges in this field include modeling and incorporating new defense options for the network operator, such as distributed generation, demand response, and the topological reconfiguration of the system.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Los estudios de vulnerabilidad pueden identificar elementos críticos en los sistemas de distribución de potencia eléctrica con el fin de tomar medidas de protección contra posibles escenarios que pueden resultar en desconexión de carga (también llamado deslastre de carga), que puede ser ocasionada por eventos naturales o ataques deliberados. Este artículo es una reseña bibliográfica sobre el segundo tipo de casos, es decir, los del problema de interdicción, en el que se asume la existencia de un agente disruptivo cuyo objetivo es maximizar los daños ocasionados al sistema mientras el operador de red actúa como agente de defensa del mismo. La interacción no simultánea de estos dos agentes crea un problema de optimización multinivel y en la bibliografía se reportan varios modelos de interdicción y soluciones para abordar el problema. La contribución principal de este artículo es la presentación de consideraciones que deben tomarse en cuenta para analizar, modelar y resolver el problema de la interdicción, incluyendo las soluciones, métodos y técnicas más comunes para solucionarlo, así como futuros estudios al respecto. Esta revisión encontró que la mayoría de la investigación en el tema se enfoca en el análisis de los sistemas de transmisión, considerando las aproximaciones lineales de la red; algunos estudios en interdicción usan un modelo AC de la red o tratan las redes de distribución directamente desde un enfoque multinivel. Algunos retos en este campo son el modelado y la inclusión de nuevas opciones de defensa para el operador de la red, como la generación distribuida, la respuesta a la demanda y la reconfiguración topológica del sistema.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[interdiction problem]]></kwd>
<kwd lng="en"><![CDATA[multilevel optimization]]></kwd>
<kwd lng="en"><![CDATA[power system vulnerability]]></kwd>
<kwd lng="en"><![CDATA[power system resilience]]></kwd>
<kwd lng="en"><![CDATA[power system optimization]]></kwd>
<kwd lng="es"><![CDATA[problema de interdicción]]></kwd>
<kwd lng="es"><![CDATA[optimización multinivel]]></kwd>
<kwd lng="es"><![CDATA[vulnerabilidad de sistemas eléctricos]]></kwd>
<kwd lng="es"><![CDATA[resiliencia de sistemas eléctricos]]></kwd>
<kwd lng="es"><![CDATA[optimización de sistemas eléctricos]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Galiana]]></surname>
<given-names><![CDATA[F.D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the Solution of the Bilevel Programming Formulation of the Terrorist Threat Problem]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2005</year>
<volume>20</volume>
<page-range>789-97</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rocco]]></surname>
<given-names><![CDATA[C.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramirez-Marquez]]></surname>
<given-names><![CDATA[J.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Salazar]]></surname>
<given-names><![CDATA[D.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Yajure]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach]]></article-title>
<source><![CDATA[IEEE Trans.Reliab.]]></source>
<year>2011</year>
<volume>60</volume>
<page-range>394-403</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lund]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Power System Structural Vulnerability Assessment Based on an Improved Maximum Flow Approach]]></article-title>
<source><![CDATA[IEEE Trans.Smart Grid]]></source>
<year>2018</year>
<volume>9</volume>
<page-range>777-85</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bompard]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Napoli]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Xue]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of structural vulnerabilities in power transmission grids]]></article-title>
<source><![CDATA[Int.J. Crit. Infrastruct. Prot.]]></source>
<year>2009</year>
<volume>2</volume>
<page-range>5-12</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[F.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Genetic Algorithm for Power System Vulnerability Analysis under Multiple Contingencies]]></article-title>
<source><![CDATA[Springer, Berlin, Heidelberg]]></source>
<year>2013</year>
<page-range>41-68</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davarikia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Barati]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A tri-level programming model for attack-resilient control of power grids]]></article-title>
<source><![CDATA[J. Mod.Power Syst. Clean Energy]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>918-29</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salmeron]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wood]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Baldick]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of Electric Grid Security Under Terrorist Threat]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2004</year>
<volume>19</volume>
<page-range>905-12</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Delgadillo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alguacil]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of Electric Grid Interdiction With Line Switching]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2010</year>
<volume>25</volume>
<page-range>633-41</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Bie]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding]]></article-title>
<source><![CDATA[Appl.Energy]]></source>
<year>2018</year>
<volume>210</volume>
<page-range>1266-79</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bie]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Battling the Extreme: A Study on the Power System Resilience]]></article-title>
<source><![CDATA[Proc. IEEE]]></source>
<year>2017</year>
<volume>105</volume>
<page-range>1253-66</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Correlation analysis of different vulnerability metrics on power grids]]></article-title>
<source><![CDATA[Phys.A Stat. Mech. Its Appl.]]></source>
<year>2014</year>
<volume>396</volume>
<page-range>204-11</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Bie]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of key strategies in realizing power system resilience]]></article-title>
<source><![CDATA[Glob.Energy Interconnect.]]></source>
<year>2018</year>
<volume>1</volume>
<page-range>70-8</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mitigating electric power system vulnerability to worst-case spatially localized attacks]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2017</year>
<volume>165</volume>
<page-range>144-54</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abedi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaudard]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Romerio]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review of major approaches to analyze vulnerability in power system]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2019</year>
<volume>183</volume>
<page-range>153-72</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dueñas-Osorio]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Time-dependent resilience assessment and improvement of urban infrastructure systems]]></article-title>
<source><![CDATA[Chaos]]></source>
<year>2012</year>
<volume>22</volume>
<page-range>033122</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dueñas-Osorio]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Min]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A three-stage resilience analysis framework for urban infrastructure systems]]></article-title>
<source><![CDATA[Struct.Saf.]]></source>
<year>2012</year>
<volume>36-37</volume>
<page-range>23-31</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gholami]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shekari]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Amirioun]]></surname>
<given-names><![CDATA[M.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Aminifar]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Amini]]></surname>
<given-names><![CDATA[M.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sargolzaei]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>32035-53</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Poljan&#353;ek]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bono]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Gutiérrez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Seismic risk assessment of interdependent critical infrastructure systems: The case of European gas and electricity networks]]></article-title>
<source><![CDATA[Earthq. Eng. Struct. Dyn.]]></source>
<year>2012</year>
<volume>41</volume>
<page-range>61-79</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dueñas-Osorio]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multi-dimensional hurricane resilience assessment of electric power systems]]></article-title>
<source><![CDATA[Struct.Saf.]]></source>
<year>2014</year>
<volume>48</volume>
<page-range>15-24</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sperstad]]></surname>
<given-names><![CDATA[I.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kjølle]]></surname>
<given-names><![CDATA[G.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Gjerde]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comprehensive framework for vulnerability analysis of extraordinary events in power systems]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2020</year>
<volume>196</volume>
<page-range>106788</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability Assessment Scheme for Power System Transmission Networks Based on the Fault Chain Theory]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2011</year>
<volume>26</volume>
<page-range>442-50</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marín-Cano]]></surname>
<given-names><![CDATA[C.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Sierra-Aguilar]]></surname>
<given-names><![CDATA[J.E.]]></given-names>
</name>
<name>
<surname><![CDATA[López-Lezama]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jaramillo-Duque]]></surname>
<given-names><![CDATA[Á.]]></given-names>
</name>
<name>
<surname><![CDATA[Villa-Acevedo]]></surname>
<given-names><![CDATA[W.M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem]]></article-title>
<source><![CDATA[Energies]]></source>
<year>2019</year>
<volume>12</volume>
<page-range>1399</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Y.L.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Resilience Analysis of Power Grids Under the Sequential Attack]]></article-title>
<source><![CDATA[IEEE Trans.Inf. Forensics Secur.]]></source>
<year>2014</year>
<volume>9</volume>
<page-range>2340-54</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roege]]></surname>
<given-names><![CDATA[P.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Collier]]></surname>
<given-names><![CDATA[Z.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mancillas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[McDonagh]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Linkov]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metrics for energy resilience]]></article-title>
<source><![CDATA[Energy Policy]]></source>
<year>2014</year>
<volume>72</volume>
<page-range>249-56</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Min]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability analysis and critical areas identification of the power systems under terrorist attacks]]></article-title>
<source><![CDATA[Phys.A Stat. Mech. Its Appl.]]></source>
<year>2017</year>
<volume>473</volume>
<page-range>156-65</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Duan]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multiple perspective vulnerability analysis of the power network]]></article-title>
<source><![CDATA[Phys.A Stat. Mech. Its Appl.]]></source>
<year>2018</year>
<volume>492</volume>
<page-range>1581-90</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arianos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bompard]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Carbone]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Xue]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Power grid vulnerability: A complex network approach]]></article-title>
<source><![CDATA[Chaos An Interdiscip. J. Nonlinear Sci.]]></source>
<year>2009</year>
<volume>19</volume>
<page-range>013119</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[28]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fang]]></surname>
<given-names><![CDATA[Y.-P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sansavini]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimum post-disruption restoration under uncertainty for enhancing critical infrastructure resilience]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2019</year>
<volume>185</volume>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mousavizadeh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Haghifam]]></surname>
<given-names><![CDATA[M.-R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shariatkhah]]></surname>
<given-names><![CDATA[M.-H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A linear two-stage method for resiliency analysis in distribution systems considering renewable energy and demand response resources]]></article-title>
<source><![CDATA[Appl.Energy]]></source>
<year>2018</year>
<volume>211</volume>
<page-range>443-60</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>[30]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimal reconfiguration of electrical distribution network using the refined genetic algorithm]]></article-title>
<source><![CDATA[Electr.Power Syst. Res.]]></source>
<year>2002</year>
<volume>62</volume>
<page-range>37-42</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>[31]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Georgiadis]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[T.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sim]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An optimization model for power grid fortification to maximize attack immunity]]></article-title>
<source><![CDATA[Int.J. Electr. Power Energy Syst.]]></source>
<year>2018</year>
<volume>99</volume>
<page-range>594-602</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>[32]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mo]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Levitin]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks]]></article-title>
<source><![CDATA[Eur.J. Oper. Res.]]></source>
<year>2015</year>
<volume>243</volume>
<page-range>200-10</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>[33]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[S.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bienstock]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Harnett]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability Analysis of Power Systems]]></article-title>
<source><![CDATA[ArXiv Prepr.]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B34">
<label>[34]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bier]]></surname>
<given-names><![CDATA[V.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gratz]]></surname>
<given-names><![CDATA[E.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Haphuriwat]]></surname>
<given-names><![CDATA[N.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Magua]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wierzbicki]]></surname>
<given-names><![CDATA[K.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Methodology for identifying near-optimal interdiction strategies for a power transmission system]]></article-title>
<source><![CDATA[Reliab. Eng. Syst. Saf.]]></source>
<year>2007</year>
<volume>92</volume>
<page-range>1155-61</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>[35]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks]]></article-title>
<source><![CDATA[Phys.A Stat. Mech. Its Appl.]]></source>
<year>2014</year>
<volume>403</volume>
<page-range>45-53</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>[36]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nasiruzzaman]]></surname>
<given-names><![CDATA[A.B.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pota]]></surname>
<given-names><![CDATA[H.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Akter]]></surname>
<given-names><![CDATA[M.N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability of the large-scale future smart electric power grid]]></article-title>
<source><![CDATA[Phys.A Stat. Mech. Its Appl.]]></source>
<year>2014</year>
<volume>413</volume>
<page-range>11-24</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>[37]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alguacil]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Delgadillo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A trilevel programming approach for electric grid defense planning]]></article-title>
<source><![CDATA[Comput.Oper. Res.]]></source>
<year>2014</year>
<volume>41</volume>
<page-range>282-90</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>[38]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ai]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Data-Driven Stackelberg Market Strategy for Demand Response-Enabled Distribution Systems]]></article-title>
<source><![CDATA[IEEE Trans.Smart Grid]]></source>
<year>2019</year>
<volume>10</volume>
<page-range>2345-57</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>[39]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhuang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling a multi-target attacker-defender game with multiple attack types]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2019</year>
<volume>185</volume>
<page-range>465-75</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>[40]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bilevel programming applied to power system vulnerability analysis under multiple contingencies]]></article-title>
<source><![CDATA[IET Gener.Transm. Distrib.]]></source>
<year>2010</year>
<volume>4</volume>
<page-range>178</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>[41]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arroyo]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernandez]]></surname>
<given-names><![CDATA[F.J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Genetic Algorithm Approach for the Analysis of Electric Grid Interdiction with Line Switching]]></source>
<year>2009</year>
<conf-name><![CDATA[ 15Conf. Intell. Syst. Appl. to Power Syst]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B42">
<label>[42]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agudelo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[López-Lezama]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz Galeano]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm]]></article-title>
<source><![CDATA[DYNA]]></source>
<year>2015</year>
<volume>82</volume>
<page-range>78-84</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>[43]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López-Lezama]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cortina-Gómez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz-Galeano]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Assessment of the Electric Grid Interdiction Problem using a nonlinear modeling approach]]></article-title>
<source><![CDATA[Electr.Power Syst. Res.]]></source>
<year>2017</year>
<volume>144</volume>
<page-range>243-54</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>[44]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cortina]]></surname>
<given-names><![CDATA[J.J.]]></given-names>
</name>
<name>
<surname><![CDATA[López-Lezama]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz-Galeano]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metaheurísticas Aplicadas al Problema de Interdicción en Sistemas de Potencia]]></article-title>
<source><![CDATA[Inf.Tecnológica]]></source>
<year>2018</year>
<volume>29</volume>
<page-range>73-88</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>[45]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salmeron]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wood]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Baldick]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2009</year>
<volume>24</volume>
<page-range>96-104</page-range></nlm-citation>
</ref>
<ref id="B46">
<label>[46]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sayyadipour]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yousefi]]></surname>
<given-names><![CDATA[G.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Latify]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mid-term vulnerability analysis of power systems under intentional attacks]]></article-title>
<source><![CDATA[IET Gener.Transm. Distrib.]]></source>
<year>2016</year>
<volume>10</volume>
<page-range>3745-55</page-range></nlm-citation>
</ref>
<ref id="B47">
<label>[47]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agudelo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[López-lezama]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis de Vulnerabilidad de Sistemas de Potencia Mediante Programación Binivel Vulnerability Analysis of Power Systems using Bilevel Programing]]></article-title>
<source><![CDATA[Inf.Tecnol.]]></source>
<year>2014</year>
<volume>25</volume>
<page-range>103-14</page-range></nlm-citation>
</ref>
<ref id="B48">
<label>[48]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[S.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bienstock]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Harnett]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analyzing Vulnerability of Power Systems with Continuous Optimization Formulations]]></article-title>
<source><![CDATA[IEEE Trans.Netw. Sci. Eng.]]></source>
<year>2016</year>
<volume>3</volume>
<page-range>132-46</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>[49]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dai]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Ni]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-physical interactions in power systems: A review of models, methods, and applications]]></article-title>
<source><![CDATA[Electr. Power Syst. Res.]]></source>
<year>2018</year>
<volume>163</volume>
<page-range>396-412</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>[50]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coordinated attacks on electric power systems in a cyberphysical environment]]></article-title>
<source><![CDATA[Electr.Power Syst. Res.]]></source>
<year>2017</year>
<volume>149</volume>
<page-range>156-68</page-range></nlm-citation>
</ref>
<ref id="B51">
<label>[51]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nemati]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Latify]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yousefi]]></surname>
<given-names><![CDATA[G.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tri-level transmission expansion planning under intentional attacks: virtual attacker approach - part I: formulation]]></article-title>
<source><![CDATA[IET Gener.Transm. Distrib.]]></source>
<year>2019</year>
<volume>13</volume>
<page-range>390-8</page-range></nlm-citation>
</ref>
<ref id="B52">
<label>[52]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nemati]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Latify]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yousefi]]></surname>
<given-names><![CDATA[G.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tri-level transmission Expansion planning under intentional attacks: virtual attacker approach-part II: Case studies]]></article-title>
<source><![CDATA[IET Gener. Transm. Distrib.]]></source>
<year>2019</year>
<volume>13</volume>
<page-range>399-408</page-range></nlm-citation>
</ref>
<ref id="B53">
<label>[53]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Conejo]]></surname>
<given-names><![CDATA[A.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Efficient Tri-Level Optimization Model for Electric Grid Defense Planning]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2017</year>
<volume>32</volume>
<page-range>2984-94</page-range></nlm-citation>
</ref>
<ref id="B54">
<label>[54]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Illindala]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Subramaniam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment]]></article-title>
<source><![CDATA[Appl.Energy]]></source>
<year>2019</year>
<volume>235</volume>
<page-range>204-18</page-range></nlm-citation>
</ref>
<ref id="B55">
<label>[55]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Incorporating Unidentifiable Cyberattacks into Power System Reliability Assessment]]></article-title>
<source><![CDATA[IEEE Power Energy Soc. Gen. Meet. IEEE]]></source>
<year>2018</year>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B56">
<label>[56]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yuan]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimal power grid protection through a defender-attacker-defender model]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2014</year>
<volume>121</volume>
<page-range>83-9</page-range></nlm-citation>
</ref>
<ref id="B57">
<label>[57]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A multi-uncertainty-set based two-stage robust optimization to defender-attacker-defender model for power system protection]]></article-title>
<source><![CDATA[Reliab.Eng. Syst. Saf.]]></source>
<year>2018</year>
<volume>169</volume>
<page-range>179-86</page-range></nlm-citation>
</ref>
<ref id="B58">
<label>[58]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Baldick]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Interdiction Analysis of Electric Grids Combining Cascading Outage and Medium-Term Impacts]]></article-title>
<source><![CDATA[IEEE Trans.Power Syst.]]></source>
<year>2014</year>
<volume>29</volume>
<page-range>2160-8</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
