2022
DOI: 10.1016/j.ress.2021.108068
|View full text |Cite
|
Sign up to set email alerts
|

Impact of inter-network assortativity on robustness against cascading failures in cyber–physical power systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 55 publications
0
9
0
Order By: Relevance
“…Paper [23] developed a model using a dynamic routing algorithm [24] to describe the information packet transmission in the cyber network, and simultaneously applied the dynamic load flow model to describe the power grid. Research [25] provided an optimised load-shedding policy to simulate the power-loss failures, out-of-control failures, and data-blocking (POD) failures in the process of cascade events. The research of ref.…”
Section: Cyber and Power Flow Calculationmentioning
confidence: 99%
See 3 more Smart Citations
“…Paper [23] developed a model using a dynamic routing algorithm [24] to describe the information packet transmission in the cyber network, and simultaneously applied the dynamic load flow model to describe the power grid. Research [25] provided an optimised load-shedding policy to simulate the power-loss failures, out-of-control failures, and data-blocking (POD) failures in the process of cascade events. The research of ref.…”
Section: Cyber and Power Flow Calculationmentioning
confidence: 99%
“…When data need to be sent from node 3 to node 4, the information route is across two zones. Firstly, data are sent to regional control centre node 25 via the information route (3,25) within zone 2. After that, data are sent to the regional control centre node 11 via the information route (11,25) which is across zone 2 and 4.…”
Section: Adjacency Matrixmentioning
confidence: 99%
See 2 more Smart Citations
“…[44], cyber and/or physical attacks [47]- [49], [51], [55], etc. Some research works concentrate on a type of asset whatever its granularity (healthcare [44], civil aviation [46], power systems [50], [51], [53], [56], port infrastructure [48], airport infrastructure [57], supply chain [56], ADS-B system [46], etc.). However, to our knowledge, no research work is dedicated to the definition of an approach for cyber or physical incident propagation in a healthcare infrastructure as a whole.…”
Section: B Incident Propagation Models and Approachesmentioning
confidence: 99%