Vol 15, No 2 (2014): VOL 15, NO 2 (2014):September 2014

First, the challenges of extracting maximum power from various energy sources are reviewed PDF 
shrushti tiwari
The implicit assumption is that the SCADA infrastructure has been hardened PDF 
mitali kori
able communication in this context is presented in. The rest of this paper is organized as follows: describes the mathematical formulation of our models and describes procedures to solve them PDF 
neha mishra
Our approach to identifying critical system components first develops a network-interdiction model to represent the optimal-attack problem that a terrorist group might face PDF 
jyoti singh