F. Arroyo, J. M. Arroyo, and F. J. Ferná-ndez, A Genetic Algorithm Approach for the Analysis of Electric Grid Interdiction with Line Switching, Intelligent System Applications to Power Systems, ISAP '09, 15th International Conference on, pp.1-6, 2009.

V. Batagelj, Semirings for social networks analysis, The Journal of Mathematical Sociology, vol.23, issue.1, pp.53-68, 1994.
DOI : 10.1007/BFb0060128

. Babu, Strategies of Multi-Objective Differential Evolution (MODE) for Optimization of Adiabatic Styrene Reactor, Proceedings of the International Conference on Emerging Mechanical Technology: Macro to Nano (EMTMN-2007); p 243. [Bier et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system, 2007.

. Eng, . Syst, . Saf, L. S. Coelho, and D. L. Bernert, An improved harmony search algorithm for synchronization of discrete-time chaotic systems, [Coelho and Bernert, pp.1155-1161, 2007.

P. Dai, Y. Dai, and K. Poh, Solving the network interdiction problem with genetic algorithms, Proceedings of the fourth Asia-Pacific conference on industrial engineering and management system, pp.18-20, 2002.

. Dobson, A LOADING-DEPENDENT MODEL OF PROBABILISTIC CASCADING FAILURE, Probability in the Engineering and Informational Sciences, vol.6, issue.01, pp.15-32, 2005.
DOI : 10.1214/aoms/1177728496

. Dobson, Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization, Dueñas-Osorio, L., and Vemuru, S.M., Cascading failures in complex infrastructures systems. Structural safety 31, pp.157-167, 2007.
DOI : 10.1063/1.2737822

. Eusgeld, The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures, Reliability Engineering & System Safety, Centrality in social networks conceptual clarification, pp.345-215, 1962.

. Freeman, Centrality in valued graphs: A measure of betweenness based on network flow, Community structure in social and biological networks Proc. Natl. Acad. Sci., USA 99, pp.141-154, 1991.
DOI : 10.1016/0378-8733(91)90017-N

. Granelli, Optimal network reconfiguration for congestion management by deterministic and genetic algorithms, Electric Power Systems Research, vol.76, issue.6-7, pp.549-556, 2006.
DOI : 10.1016/j.epsr.2005.09.014

. Greem, . Kim, Z. W. Geem, J. H. Kim, and G. V. Loganathan, A new heuristic optimization algorithm: harmony search, Simulation, vol.76, issue.2, pp.60-68, 2001.

B. Hines, H. Hines, S. Blumsack, and . Hines, Do topological models provide good information about electricity infrastructure vulnerability?, Proceedings of the 41st Hawaii International Conference on System Science, p.33122, 2008.
DOI : 10.1063/1.3489887

. Kinney, Modeling cascading failures in the North American power grid, The European Physical Journal B-Condensed matter and complex systems, Phys.Rev.E, vol.66, issue.461, pp.36119-101, 2002.

W. Kroger, E. Zio, V. Latora, and M. R. Marchoiri, Vulnerable Systems [Latora and Marchiori Vulnerability and protection of infrastructure networks Controlling Cascading Failure: Understanding the Vulnerabilities of Interconnected Infrastructures, Journal of Urban Technology, vol.9, issue.1, pp.109-123, 2002.

. Mahdavi, An improved harmony search algorithm for solving optimization problems, Applied Mathematics and Computation, vol.188, issue.2, pp.1567-79, 2007.
DOI : 10.1016/j.amc.2006.11.033

L. Motter, A. E. Motter, L. , and Y. , Cascade-based attacks on complex networks, Physical Review E, vol.66, issue.6, p.65102, 2002.
DOI : 10.1103/PhysRevE.66.065102

A. E. Motter, Cascade Control and Defense in Complex Networks, Physical Review Letters, vol.93, issue.9, pp.98701-98702, 2004.
DOI : 10.1103/PhysRevLett.93.098701

G. Newman, M. E. Newman, and M. Girvan, Finding and evaluating community structure in networks, Physical Review E, vol.69, issue.2, p.26113, 2004.
DOI : 10.1103/PhysRevE.69.026113

J. Nieminen, On the centrality in a graph, Scandinavian Journal of Psychology, vol.15, issue.1, pp.332-336, 1974.
DOI : 10.1007/BF02289527

A. Ponsich and C. A. Coello, Differential Evolution performances for the solution of mixed-integer constrained process engineering problems, Applied Soft Computing, vol.11, issue.1, 2009.
DOI : 10.1016/j.asoc.2009.11.030

]. C. Rocco, S. Ramirez-marquez, and J. E. , Deterministic network interdiction optimization via an evolutionary approach, Reliability Engineering & System Safety, vol.94, issue.2, pp.568-576, 2009.
DOI : 10.1016/j.ress.2008.06.008

. Rosato, Topological properties of high-voltage electrical transmission networks, Electric Power Systems Research, pp.99-105, 2007.

. Rosato, Influence of the topology on the power flux of the Italian high-voltage electrical network, arXiv.org, physics, arXiv:0909 The centrality index of graphs Optimum design of steel sway frames to BS5950 using harmony search algorithm, Psychometrika J Constr Steel Res, vol.31, issue.651, pp.581-60336, 1966.

. Salmeron, Analysis of Electric Grid Security Under Terrorist Threat, IEEE Transactions on Power Systems, vol.19, issue.2, 2004.
DOI : 10.1109/TPWRS.2004.825888

. Salmeron, Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids, IEEE Transactions on Power Systems, vol.24, issue.1, 2009.
DOI : 10.1109/TPWRS.2008.2004825

G. Schnyder, G. Schnyder, and H. Glavitsch, Integrated security control using an optimal power flow and switching concepts, IEEE Transactions on Power Systems, vol.3, issue.2, pp.782-790, 1988.
DOI : 10.1109/59.192935

G. Schnyder, G. Schnyder, and H. Glavitsch, Security enhancement using an optimal switching power flow, IEEE Transactions on Power Systems, vol.5, issue.2, pp.674-681, 1990.
DOI : 10.1109/59.54580

. Shao, W. Shao, and V. Vittal, Corrective Switching Algorithm for Relieving Overloads and Voltage Violations, IEEE Transactions on Power Systems, vol.20, issue.4, pp.1877-1885, 2005.
DOI : 10.1109/TPWRS.2005.857931

P. Storn, R. Storn, and K. Price, Differential evolution ? A simple and efficient adaptive scheme for global optimization over continuous spaces, 1995.

. Talukdar, Cascading Failures: Survival versus Prevention, The Electricity Journal, vol.16, issue.9, pp.25-31, 2003.
DOI : 10.1016/j.tej.2003.09.003

. Wang, A Modified Binary Differential Evolution Algorithm, Life System Modeling and Intelligent Computing, pp.49-57, 2010.
DOI : 10.4304/jsw.3.9.28-35

E. Zio, G. Sansavini, E. Zio, and G. Sansavini, Modeling failure cascade in network systems due to distributed random disturbances Safety, Reliability and Risk Analysis: Theory, Methods and Applications Modeling failure cascades in critical infrastructures with physically-characterized components and interdependencies, Reliability, Risk and Safety: Back to the Future ? Ale, Papazoglou & Zio Proceedings of ESREL 2010 Europe Annual Conference, pp.652-661, 2008.

V. Zio, E. Zio, and G. Viadana, A thorough analysis of Differential Evolution in singleobjective and multi-objective optimization, submitted to The Seventh International Conference on, Theory. Methods. Applications, 2011.