2010
DOI: 10.1049/iet-gtd.2009.0098
|View full text |Cite
|
Sign up to set email alerts
|

Bilevel programming applied to power system vulnerability analysis under multiple contingencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
138
0
11

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 207 publications
(149 citation statements)
references
References 27 publications
0
138
0
11
Order By: Relevance
“…Of specific relevance to our work is the literature on security-constrained optimal power flow in situations where large numbers of system components fail. This literature is mostly based on worstcase network interdiction analysis and includes solution methods based on bi-level and mixed-integer programming (see [24,25,1,8,33,32]) and graph algorithms (see [22,3,8,15,16]). …”
mentioning
confidence: 99%
“…Of specific relevance to our work is the literature on security-constrained optimal power flow in situations where large numbers of system components fail. This literature is mostly based on worstcase network interdiction analysis and includes solution methods based on bi-level and mixed-integer programming (see [24,25,1,8,33,32]) and graph algorithms (see [22,3,8,15,16]). …”
mentioning
confidence: 99%
“…Within this paradigm, an attacker marshals their available resources to cause maximum damage, while simultaneously the system operator proactively uses their resources to minimize the impact of an attack (for instance, by post-attack generator redispatch or line switching.) The work of Arroyo implemented this model as a bilevel optimization problem in [95], with his subsequent work elucidating further refinements to such a formulation [96]- [99]. Others have also made important contributions to the multilevel modelling of power system attack and defence games [100]- [102]: some contributions additionally consider optimal pre-emptive defensive hardening of certain components [99], [103], [104].…”
Section: F Multilevel Attacker/defender Formulationsmentioning
confidence: 99%
“…The linear BP has been applied to a large variety of problems, e.g., worst overloads [2], [5], terrorist threats [13], [14], worst-case interdictions [15], vulnerability analysis under multiple contingencies [16], contingency-constrained unit commitment [17], etc. Most of these approaches reformulate the lower-level problem by means of Karush-Kuhn-Tucker optimality conditions, leading to a MPEC single level optimization, and further transform the problem into a more tractable MILP, except for [16] which uses results from duality theory and [17] which uses robust optimization techniques.…”
mentioning
confidence: 99%
“…Most of these approaches reformulate the lower-level problem by means of Karush-Kuhn-Tucker optimality conditions, leading to a MPEC single level optimization, and further transform the problem into a more tractable MILP, except for [16] which uses results from duality theory and [17] which uses robust optimization techniques.…”
mentioning
confidence: 99%