2016
DOI: 10.1109/tpwrs.2015.2482364
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Based Contingency Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(36 citation statements)
references
References 19 publications
0
34
0
Order By: Relevance
“…The combinations of the substation criticality have been investigated in the recent years on "bottleneck list" in [9] and [10], which essentially assess the risk level for each substation outage by identifying the cases that are criticallyweakened conditions based on presumed attack scenarios. With the consistent representation of terminology in the definition of "critical" cases, the section extends the modeling of relay outages that can be risky to manipulated that may initiate system-wide instability.…”
Section: Risk Modeling Of Relay Outagesmentioning
confidence: 99%
“…The combinations of the substation criticality have been investigated in the recent years on "bottleneck list" in [9] and [10], which essentially assess the risk level for each substation outage by identifying the cases that are criticallyweakened conditions based on presumed attack scenarios. With the consistent representation of terminology in the definition of "critical" cases, the section extends the modeling of relay outages that can be risky to manipulated that may initiate system-wide instability.…”
Section: Risk Modeling Of Relay Outagesmentioning
confidence: 99%
“…Thus, Equation (14) is modified to (15) for meeting the relevant requirement of MOSEK, and this modification does not change the feasibility and optimality of the obtained solution although the searching space is expanded:…”
Section: Ecqp Modelmentioning
confidence: 99%
“…Actually, when constraint (14) is replaced by (15), the linear objective function (9) can only achieve its maximum at its boundaries, which are defined by (14) and other linear constraints in (10)- (13). Therefore, this relaxation of constraint (15) still gives the same optimal solutions for (9)- (14).…”
Section: Ecqp Modelmentioning
confidence: 99%
“…A power network without an EMLN cannot handle heavy power flow conditions as well as one with an EMLN. Moreover, contingency analysis is applicable to power networks regardless of the presence on EMLNs [20][21][22][23][24]. Therefore, these researchers believe that it is not necessary to specifically extract and study EMLNs or to deliberately avoid them.…”
Section: Introductionmentioning
confidence: 99%