Transmission security

Known as: TRANSEC 
Transmission security (TRANSEC) is the component of communications security (COMSEC) that results from the application of measures designed to… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper presents a new approach for energy and reserve scheduling in electricity markets subject to transmission flow limits… (More)
  • figure 1
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the cloud, the data is transferred… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
This paper presents the solution to the security- constrained unit commitment (SCUC) problem with a detailed representation of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table III
Is this relevant?
2010
2010
This paper is a first study on the usage of non-systematic codes based on scrambling matrices for physical layer security. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The contribution of this paper focuses on the development of a security-based methodology for the solution of short-term SCUC… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper proposes a two-level framework for the operation of a competitive market for reactive power ancillary services. It is… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Cascading overload trip due to lack of transmission section protection is an important reason of large-scale blackout. This paper… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
The proposed approach to the optimal coordination of midterm planning can be used by vertically integrated utilities as well as… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table I
Is this relevant?