2013
DOI: 10.1109/jsyst.2012.2223512
|View full text |Cite
|
Sign up to set email alerts
|

Performance of Electric Power Systems Under Physical Malicious Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
37
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(38 citation statements)
references
References 37 publications
1
37
0
Order By: Relevance
“…However, the opposing community asserts that the pure topological CN approach loses the details of the physics behind Kirchhoff's laws and fails at predicting important aspects of power grids. In this respect, as mentioned, hybrid approaches include concepts from EE [82][83][84]96,[98][99][100][101][102]. Nonetheless, the CN approach with purely topological analysis (or even with extended ones to take into account minimal electrical information [34]) has been found to be useful to detect critical elements and to assess topological robustness [35,97,103].…”
Section: Discussion: Is the Cn Approach Useful In Power Grids?mentioning
confidence: 99%
“…However, the opposing community asserts that the pure topological CN approach loses the details of the physics behind Kirchhoff's laws and fails at predicting important aspects of power grids. In this respect, as mentioned, hybrid approaches include concepts from EE [82][83][84]96,[98][99][100][101][102]. Nonetheless, the CN approach with purely topological analysis (or even with extended ones to take into account minimal electrical information [34]) has been found to be useful to detect critical elements and to assess topological robustness [35,97,103].…”
Section: Discussion: Is the Cn Approach Useful In Power Grids?mentioning
confidence: 99%
“…Likewise, metaheuristic formulations to identify promising attack targets are also common [37], [38], [40], [79], [84]- [88]. Finally, and as previously mentioned, network structural metrics are also used within the power systems literature on attack simulation [33], [46], [47], [54], [55], [89]- [91].…”
Section: E Attack Modellingmentioning
confidence: 99%
“…In essence, it uses mixed integer linear programming to select the K lines to remove from a system, where the novel objective function estimates post-removal line overloads (details of this formulation are given anon). Random This simple strategy is included as a baseline control, as in [91]. For each power system snapshot to be attacked, the K lines to be removed are selected based on a pseudorandom integer generator.…”
Section: A Branch Interdiction Strategiesmentioning
confidence: 99%
“…A heuristic methodology [1] uses five centrality measures: degree centrality, betweenness centrality, eccentricity centrality, centroid centrality and radiality. The methodology ranks nodes in five lists, one list for each centrality measure.…”
Section: Related Workmentioning
confidence: 99%