2019
DOI: 10.1016/j.physa.2019.04.235
|View full text |Cite
|
Sign up to set email alerts
|

Optimization on vulnerability analysis and redundancy protection in interdependent networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…In Table 3, BA network has a shorter average geodesic distance, which can efficiently transmit control commands. The NW network has a bigger clustering coefficient, which is robust to targeted attack [21]. We employ the IEEE 14 bus test system to represent physical power grid, wherein the type of coupling connection is that critical nodes in the physical power grid are connected to multiple router nodes in a communication network for redundancy protection, while other nodes stay ‘one‐to‐one correspondence’ connection.…”
Section: Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…In Table 3, BA network has a shorter average geodesic distance, which can efficiently transmit control commands. The NW network has a bigger clustering coefficient, which is robust to targeted attack [21]. We employ the IEEE 14 bus test system to represent physical power grid, wherein the type of coupling connection is that critical nodes in the physical power grid are connected to multiple router nodes in a communication network for redundancy protection, while other nodes stay ‘one‐to‐one correspondence’ connection.…”
Section: Case Studymentioning
confidence: 99%
“…The authors of [35, 36] figured out the critical nodes whose removal maximally destroys the systems to provide redundancy protection. The authors of [21, 37, 38], through adding or reallocating intra‐links in physical power grid or communication network, enhanced the similarity of coupled networks to improve systems robustness. Liu et al .…”
Section: Related Workmentioning
confidence: 99%
“…To test the vulnerability of systems in a cascading failure, we propose three typical attack types to study [48]. Owing to the uncertainty of the attack from the cyber layer, we assume that the attacker is capable of corresponding knowledge on the structure of systems and can attack certain significant nodes of systems to result in catastrophic blackouts.…”
Section: Impact Of Attack Scene On Cascading Failurementioning
confidence: 99%
“…Guo H et al 12 used betweenness, degree, and loads (in physical network) as parameters for nodes evaluation. Chen L et al 16 proposed inter high degree attack, inter high betweenness attack, inter high degree‐betweenness attack, and inter high betweenness‐degree attack to attack different interdependent networks. However, Previous studies only analyzed the different coupling relationships of one network relationship, and the analysis process was relatively redundant and complex.…”
Section: Introductionmentioning
confidence: 99%