2011
DOI: 10.1109/tsg.2011.2129544
|View full text |Cite
|
Sign up to set email alerts
|

A Dependency Graph Approach for Fault Detection and Localization Towards Secure Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
78
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 138 publications
(78 citation statements)
references
References 21 publications
0
78
0
Order By: Relevance
“…calculated considering line " " as tripped should be minimum. If line " " ranks above line " " in the ranking done using and is below threshold value, then line " " will be wrongly considered as the tripped line: (13) As and both are below threshold and is same for both the cases (14)…”
Section: Impact Of Wrong Identification In Predicting Dynamic Behamentioning
confidence: 99%
See 2 more Smart Citations
“…calculated considering line " " as tripped should be minimum. If line " " ranks above line " " in the ranking done using and is below threshold value, then line " " will be wrongly considered as the tripped line: (13) As and both are below threshold and is same for both the cases (14)…”
Section: Impact Of Wrong Identification In Predicting Dynamic Behamentioning
confidence: 99%
“…Synchrophasors have been used in [13]- [23] to quickly identify the tripped line. The Markov dependency graph model was used to locate the fault, assuming the bus phasor angles are conditionally independent and further that synchrophasor measurements cover the entire network [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we formulate a Gaussian Markov random field (GMRF) model [24] for the system states, and describe the measurement models. …”
Section: System Modelmentioning
confidence: 99%
“…Cyber security is of paramount importance in smart grid as communications are deeply involved in its operations [8], [9], [10], [11], [12], [13]. All the data transmitted in the grid must be authenticated and secured against malicious modification.…”
Section: Introductionmentioning
confidence: 99%