2014
DOI: 10.1111/risa.12281
|View full text |Cite
|
Sign up to set email alerts
|

Topological Performance Measures as Surrogates for Physical Flow Models for Risk and Vulnerability Analysis for Electric Power Systems

Abstract: Critical infrastructure systems must be both robust and resilient in order to ensure the functioning of society. To improve the performance of such systems, we often use risk and vulnerability analysis to find and address system weaknesses. A critical component of such analyses is the ability to accurately determine the negative consequences of various types of failures in the system. Numerous mathematical and simulation models exist that can be used to this end. However, there are relatively few studies compa… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(34 citation statements)
references
References 39 publications
0
34
0
Order By: Relevance
“…However, there is debate in the risk analysis literature regarding whether assigning static probabilities is even feasible. One group (see Aven & Guikema, ; Aven & Renn, ; Brown & Cox, ; Cox, ) argues that the intelligent nature of the adversary makes assigning meaningful and useful probabilities problematic if not impossible. Bayesian probabilities of attack can be elicited through experts, but are misleading because the defender and attacker act on different knowledge bases.…”
Section: Conceptual Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, there is debate in the risk analysis literature regarding whether assigning static probabilities is even feasible. One group (see Aven & Guikema, ; Aven & Renn, ; Brown & Cox, ; Cox, ) argues that the intelligent nature of the adversary makes assigning meaningful and useful probabilities problematic if not impossible. Bayesian probabilities of attack can be elicited through experts, but are misleading because the defender and attacker act on different knowledge bases.…”
Section: Conceptual Limitationsmentioning
confidence: 99%
“…Articles by Alderson et al (2015b) and Alderson, Brown, Carlyle, and Anthony Cox (2013) emphasize the use of physical infrastructure models rather than simple topological representations to provide the most accurate reflections of network performance. Larocca, Johansson, Hassel, and Guikema (2015) compared a range of topological metrics and physical models to measure power system performance, and found that combining graph theory with physical flow models provided the most accurate insights.…”
Section: Analysis Resolution Of Threat-asset Pairsmentioning
confidence: 99%
“…Automatic fare collection system (12) Screen doors (13) Escalator (14) Environment control system (15) Water supply and drainage system (16) Electrical and mechanical control system (17)…”
Section: Degreementioning
confidence: 99%
“…With the increasing of complexity and hazards, there is a need to develop new perspective or approach for infrastructure safety. In the context of the existing literature, some attention is already paid to vulnerability of infrastructure system [11][12][13]. Vulnerability analysis is applied within the management of CIs and some achievements have been made by exploring the impacts of random disturbances, deliberate attacks, and natural disasters.…”
Section: Introductionmentioning
confidence: 99%
“…Some studies [23], [25], [27] have provided qualitative comparisons between complex network theory models and power flow models -identifying similarities and differences, and evaluating advantages and disadvantages. Most recently, Correa and Yusta conclude on the appropriateness of graph theory techniques for the assessment of electric network vulnerability by comparison to physical power flow models [28].…”
Section: Introductionmentioning
confidence: 99%