2017
DOI: 10.1016/j.epsr.2016.08.046
|View full text |Cite
|
Sign up to set email alerts
|

A risk optimization model for enhanced power grid resilience against physical attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(47 citation statements)
references
References 23 publications
0
47
0
Order By: Relevance
“…Generators in this system have high robustness to spoofing attacks. Two possible explanations include the initial higher load rate Q (Q ij = f ij /C ij ) of these branches (such as Q (6,11) = 70.4%, Q (16,19) = 76.7%, Q (21,22) = 67.7%, and Q (21,22) = 59% (Q average = 35.9%)) and the unreasonable partial design of topology (like branch (2,25). Others --Remark 1.…”
Section: Simulation With Ieee 39-bus System In Thismentioning
confidence: 99%
See 1 more Smart Citation
“…Generators in this system have high robustness to spoofing attacks. Two possible explanations include the initial higher load rate Q (Q ij = f ij /C ij ) of these branches (such as Q (6,11) = 70.4%, Q (16,19) = 76.7%, Q (21,22) = 67.7%, and Q (21,22) = 59% (Q average = 35.9%)) and the unreasonable partial design of topology (like branch (2,25). Others --Remark 1.…”
Section: Simulation With Ieee 39-bus System In Thismentioning
confidence: 99%
“…In these models, the impacts of cyber attacks are simplified to load curtailment or cutting off overloaded branches. Nezamoddini et al [21] addressed the problem of the transmission system security with an optimization model and measured the damage of cyber attacks in terms of the load curtailment. Stefanov and Liu [22] modeled the system based on characteristics of generators for identification of cyber-physical system vulnerabilities, security enhancement, impact analysis, and mitigation of cyber attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Using Di and Ai from relations (15) and (16) and by substituting them in relations (13) and (14), below relationships can be derived.…”
Section: Cyber Attack and Defense Budget Formulationmentioning
confidence: 99%
“…Disruptions in an energy system are sometimes inevitable, uncontrollable and unpredictable [7]. As service industry, the energy system must guarantee the continuity of energy supply for customers.…”
Section: Introductionmentioning
confidence: 99%
“…A column-and-constraint generation algorithm is applied to solve a two-stage robust optimization problem in [14]. In [7], a risk assessment model is proposed to determine potential vulnerabilities of power system and provide feasible plans for enhanced protections according to the budgets for power grid construction.…”
Section: Introductionmentioning
confidence: 99%