2016
DOI: 10.1016/j.physa.2016.05.001
|View full text |Cite
|
Sign up to set email alerts
|

A power flow based model for the analysis of vulnerability in power networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
17
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…The existing studies on power network invulnerability are either based on analytic method [1,2] or inspired by complex network theory [5,6]. The former can fully reflect the functional features of the increasingly complex power networks, but is too complex to be applied widely or computed easily [3,4]. The latter approach supports rapid analysis of large networks, but has difficulty in analysing functional features.…”
Section: Introductionmentioning
confidence: 99%
“…The existing studies on power network invulnerability are either based on analytic method [1,2] or inspired by complex network theory [5,6]. The former can fully reflect the functional features of the increasingly complex power networks, but is too complex to be applied widely or computed easily [3,4]. The latter approach supports rapid analysis of large networks, but has difficulty in analysing functional features.…”
Section: Introductionmentioning
confidence: 99%
“…Many researches have been carried out attempting to solve various challenges which energy systems are currently facing, e.g., system reliability and stability (Zio and Di Maio, 2010;Fang and Zio, 2013;Zhang et al, 2016a), operation efficiency and cost control (Hegde and Gray, 2017;Azadeh et al, 2016), renewable energy management (Lou et al, 2016) and environment issues (Tan et al, 2016). The application of techniques of forecasting (Wang et al, 2016;Kalantari-Dahaghi et al, 2015), classification (Hu et al, 2010;Pooyan et al, 2015) and optimization (Azadeh et al, 2016;Xiong et al, 2018) has been successfully explored in different energy systems, to the benefit of regulators, customers and operators. Besides, recurrent and cascade neural networks are among the best choices for dynamic system predictive modeling (Vaferi et al, 2015;Lashkarbolooki et al, 2013;Güler and Übeyli, 2006;Güler et al, 2005).…”
Section: Introductionmentioning
confidence: 99%
“…The evolution of both logical and real values of system parameters can be analyzed by a hybrid attack graph under attack and recovery actions scenarios [14]. As simultaneous attacks and sequential attacks have diverse impacts on power systems, it is necessary to investigate the cascading failure propagation of multiple attack scenarios by using proper evaluation indexes.However, vulnerability of topology is affected by the transmission efficiency, connectivity, and connected components [15], particularly the power flow distribution of power systems [16]. The topology of the power system is relatively inflexible and vulnerable to intentional attacks [17].…”
mentioning
confidence: 99%
“…However, vulnerability of topology is affected by the transmission efficiency, connectivity, and connected components [15], particularly the power flow distribution of power systems [16]. The topology of the power system is relatively inflexible and vulnerable to intentional attacks [17].…”
mentioning
confidence: 99%