Demarco C L, Qverbye T J. An energy based securtity measure for assessing vulnerability to voltage collapse[J]. IEEE Transactions on Power Systems, 1990, 5(2): 419-427.
Ubeda J R, Allan R N. Sequential simulation applied to composite system reliability evaluation[J]. IEEE Transactions on Power System, 1994, 9(1): 81-86.
[4]
Yu Xingbin, Singh C. A practical approach for integrated power system vulnerability analysis with protection failures[J]. IEEE Transmissions on Power Systems, 2004, 19(4): 1818-1820.
[5]
Su Sheng, Li K K, Chan W L, et al. Monte Carlo based maintenance resource allocation considering vulnerability[C]. Transmission and Distribution Conference & Exhibition: Asia and Pacific, August, 2005, Dalian, China.
[6]
Gallos Lazaros K, Panos Argyrakis, Armin Bunde, et al. Tolerance of scale-free networks: from friendly to intentional attack strategies[J]. Physical A, 2004, 344: 504-509.
Fouad A A, Qin Z, Vitttal V. System vulnerability as a concept to assess power system dynamic security[J]. IEEE Transactions on Power Systems, 1994, 9(2): 1009-1015.
[10]
Nima Amja, Masoud Esmaili. Improving voltage security assessment and ranking vulnerable buses with consideration of power system limits[J]. Electrical Power and Energy Systems, 2003, 25: 705-715.
[11]
Bhavaraju M P, Billinton R, Reppen N D. Requirements for composite system reliability evaluation models[J]. IEEE Transactions on Power System, 1988, 3(1): 149-157.
[12]
Singh C, Patton A D. Protection system reliability modeling: Unreadiness probability and Mean duration of undetected faults[J]. IEEE Transations on Power Systems, 1980, 29: 339-340.
Chen X G, Sun K, Cao Y J, Wang Shaobu. Identification of vulnerable lines in power grid based on complex network theory[C]. Power Engineering Society General Meetting, June, 2007, Florida, USA.