R. Albert, I. Albert, and G. L. Nakarado, Structural vulnerability of the North American power grid, Physical Review E, vol.69, issue.2, p.25103, 2004.
DOI : 10.1103/PhysRevE.69.025103

V. Batagelj, Semirings for social networks analysis, The Journal of Mathematical Sociology, vol.23, issue.1, pp.53-68, 1994.
DOI : 10.1007/BFb0060128

B. V. Babu, A. M. Gujarathi, P. Katla, and V. B. Laxmi, Strategies of Multi-Objective Differential Evolution (MODE) for Optimization of Adiabatic Styrene Reactor, Proceedings of the International Conference on Emerging Mechanical Technology: Macro to Nano, 2007.

L. S. Coelho and D. L. Bernert, An improved harmony search algorithm for synchronization of discrete-time chaotic systems, Chaos Solitons Fract, 2008.

L. Dueñas-osorio and S. M. Vemuru, Cascading failures in complex infrastructure systems, Structural Safety, vol.31, issue.2, pp.157-167
DOI : 10.1016/j.strusafe.2008.06.007

L. C. Freeman, Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239
DOI : 10.1016/0378-8733(78)90021-7

L. C. Freeman, S. P. Borgatti, and D. R. White, Centrality in valued graphs: A measure of betweenness based on network flow, Social Networks, vol.13, issue.2, pp.141-154, 1991.
DOI : 10.1016/0378-8733(91)90017-N

M. Girvan and M. E. Newman, Community structure in social and biological networks, Proc. Natl. Acad. Sci., USA 99, 2002.
DOI : 10.1073/pnas.122653799

G. Granelli, M. Montagna, F. Zanellini, P. Bresesti, R. Vailati et al., Optimal network reconfiguration for congestion management by deterministic and genetic algorithms, Electric Power Systems Research, vol.76, issue.6-7, pp.549-556, 2006.
DOI : 10.1016/j.epsr.2005.09.014

Z. W. Geem, J. H. Kim, and G. V. Loganathan, A New Heuristic Optimization Algorithm: Harmony Search, SIMULATION, vol.76, issue.2, pp.60-68, 2001.
DOI : 10.1177/003754970107600201

V. Latora and M. Marchoiri, Vulnerability and protection of infrastructure networks, Physical Review E, vol.71, issue.1, 15103.
DOI : 10.1103/PhysRevE.71.015103

R. G. Little, Controlling Cascading Failure: Understanding the Vulnerabilities of Interconnected Infrastructures, Journal of Urban Technology, vol.13, issue.5, pp.109-123, 2002.
DOI : 10.1017/CBO9780511805073

M. Mahdavi, M. Fesanghary, and E. Damangir, An improved harmony search algorithm for solving optimization problems, Applied Mathematics and Computation, vol.188, issue.2, pp.1567-79, 2007.
DOI : 10.1016/j.amc.2006.11.033

A. E. Motter and Y. Lai, Cascade-based attacks on complex networks, Physical Review E, vol.66, issue.6, p.65102, 2002.
DOI : 10.1103/PhysRevE.66.065102

A. E. Motter, Cascade Control and Defense in Complex Networks, Physical Review Letters, vol.93, issue.9, pp.98701-98702, 2004.
DOI : 10.1103/PhysRevLett.93.098701

M. E. Newman and M. Girvan, Finding and evaluating community structure in networks, Physical Review E, vol.69, issue.2, p.26113, 2004.
DOI : 10.1103/PhysRevE.69.026113

J. Nieminen, On the centrality in a graph, Scandinavian Journal of Psychology, vol.15, issue.1, pp.332-336, 1974.
DOI : 10.1007/BF02289527

A. Ponsich and C. A. Coello, Differential Evolution performances for the solution of mixed-integer constrained process engineering problems, Applied Soft Computing, vol.11, issue.1, 2009.
DOI : 10.1016/j.asoc.2009.11.030

G. Sabidussi, The centrality index of a graph, Psychometrika, vol.24, issue.66, pp.31-581, 1966.
DOI : 10.1007/BF02289527

M. P. Saka, Optimum design of steel sway frames to BS5950 using harmony search algorithm, Journal of Constructional Steel Research, vol.65, issue.1, pp.36-43, 2009.
DOI : 10.1016/j.jcsr.2008.02.005

J. Salmeron, K. Wood, and R. Baldick, Analysis of Electric Grid Security Under Terrorist Threat, IEEE Transactions on Power Systems, vol.19, issue.2, 2004.
DOI : 10.1109/TPWRS.2004.825888

G. Schnyder and H. Glavitsch, Integrated security control using an optimal power flow and switching concepts, IEEE Transactions on Power Systems, vol.3, issue.2, pp.782-790, 1988.
DOI : 10.1109/59.192935

G. Schnyder and H. Glavitsch, Security enhancement using an optimal switching power flow, IEEE Transactions on Power Systems, vol.5, issue.2, pp.674-681, 1990.
DOI : 10.1109/59.54580

W. Shao and V. Vittal, Corrective Switching Algorithm for Relieving Overloads and Voltage Violations, IEEE Transactions on Power Systems, vol.20, issue.4, pp.1877-1885, 2005.
DOI : 10.1109/TPWRS.2005.857931

R. Storn and K. Price, Differential evolution ? A simple and efficient adaptive scheme for global optimization over continuous spaces, 1995.

S. N. Talukdar, J. Apt, M. Ilic, L. B. Lave, and M. Morgan, Cascading Failures: Survival versus Prevention, The Electricity Journal, vol.16, issue.9, pp.25-31, 2003.
DOI : 10.1016/j.tej.2003.09.003

L. Wang, X. Fu, M. I. Menhas, and M. Fei, A Modified Binary Differential Evolution Algorithm, Lecture Notes in Computer Science, vol.3, pp.49-57, 2010.
DOI : 10.4304/jsw.3.9.28-35

E. Zio and G. Sansavini, Modeling failure cascade in network systems due to distributed random disturbances Safety, Reliability and Risk Analysis: Theory, Methods and Applications, Proceedings ESREL, 2008.

E. Zio and G. Sansavini, Modeling failure cascades in critical infrastructures with physically-characterized components and interdependencies, in Reliability, Risk and Safety: Back to the Future ? Ale, Proceedings of ESREL 2010 Europe Annual Conference, pp.652-661, 2010.

E. Zio and G. Viadana, A thorough analysis of Differential Evolution in single-objective and multi-objective optimization, submitted to The Seventh International Conference on Mathematical Methods in Reliability " -Theory, Methods. Applications, 2011.