2017
DOI: 10.1109/jetcas.2017.2704879
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Malicious Interdiction Strategies Against Electrical Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 105 publications
0
17
0
Order By: Relevance
“…Graph theory can be a useful approach to assess power systems operation [8], [10], [11]. Power networks could be considered as complex networks and therefore, graph theory has been applied to analyze them in different aspects such as topological vulnerabilities [12]- [15]. To analyze topological vulnerabilities within power grids, power flow directions can be used to model the networks as a directed acyclic graph [12].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Graph theory can be a useful approach to assess power systems operation [8], [10], [11]. Power networks could be considered as complex networks and therefore, graph theory has been applied to analyze them in different aspects such as topological vulnerabilities [12]- [15]. To analyze topological vulnerabilities within power grids, power flow directions can be used to model the networks as a directed acyclic graph [12].…”
Section: Introductionmentioning
confidence: 99%
“…Power networks could be considered as complex networks and therefore, graph theory has been applied to analyze them in different aspects such as topological vulnerabilities [12]- [15]. To analyze topological vulnerabilities within power grids, power flow directions can be used to model the networks as a directed acyclic graph [12]. A directed acyclic graph refers to a directed graph which has no cycles e.g paths connecting any node back to itself [16]- [18].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In common with previous works on congestion alleviation (e.g [40]), for the present validation these test system were artificially weakened to induce congestion (as most common test power systems are generously specified, branch thermal limits do not tend to constrain generator schedules, except perhaps in the (N-1) sense) Firstly, branch thermal limits were reduced to 50% of their rated values. Then, to allow the two systems to be compared in an even-handed way, their loadings were normalized, by running an optimal power flow whose sole objective was maximising their total demands by uniformly scaling all loads in the system (as in [41]). By creating substantial congestion costs, it is easier to appraise the ability of flow-controllers to improve the optimality of generation schedules.…”
Section: Test Systemsmentioning
confidence: 99%
“…To gauge the efficacy of the flow controllers over the full gamut of operational situations that may arise on each system, a scenario creation approach from [41] was adapted. This technique was used to produce 100 representative snapshots of potential generator dispatch profiles on each system.…”
Section: Test Systemsmentioning
confidence: 99%