2011
DOI: 10.1109/tpwrs.2010.2078524
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks

Abstract: Recently, game theory has been used to design optimized strategies for defending an electric power system against terrorist attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two effective allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new cri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
56
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 86 publications
(56 citation statements)
references
References 18 publications
0
56
0
Order By: Relevance
“…Traffic-flow short-term forecasting for the intelligent transportation system to provide traffic information is an important basis for traffic analysis [3,4] and control [5]. Short-term traffic-flow forecasting has been widely researched by scholars at home and abroad, who have obtained many research results [6][7][8], and many theories and methods [9,10] have been applied to the study of shortterm traffic forecasting.…”
Section: Introductionmentioning
confidence: 99%
“…Traffic-flow short-term forecasting for the intelligent transportation system to provide traffic information is an important basis for traffic analysis [3,4] and control [5]. Short-term traffic-flow forecasting has been widely researched by scholars at home and abroad, who have obtained many research results [6][7][8], and many theories and methods [9,10] have been applied to the study of shortterm traffic forecasting.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the cooperative control has received considerable attention mainly due to its broad applications to multiagent systems such as the state consensus seeking of multiple mobile vehicles [1][2][3], flocking, rendezvous, and containment in natural and social systems [4][5][6][7][8][9], analysis and control of cyberphysical networks [10], and distributed control and dispatching in smart grids [11][12][13][14][15][16][17]. The cooperative control is an interdisciplinary subject and several researchers from different scientific communities have conducted various research studies concerning the abovementioned applications [2,18].…”
Section: Introductionmentioning
confidence: 99%
“…This criterion requires that a planned power system should have enough security margins and be able to withstand the failure of any single component. For example, the failure of a transmission line should not violate the system due to redundancy (security margins) [5]. However, this security criterion may not be adequate to assess new scenarios where multiple-component failures occur simultaneously or successively in a very short time.…”
Section: Introductionmentioning
confidence: 99%
“…The recent serious blackouts have highlighted the necessity of higher order (N-k) contingency analysis. That is to say, a planned system should be able to withstand the failure of any k components [5]. However, this is very challenging due to the fact that the total number of contingencies to be analysed is N!/[k!(N-k)].…”
Section: Introductionmentioning
confidence: 99%