2018
DOI: 10.1109/jsyst.2017.2761844
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Analysis of Power Systems Under Physical Deliberate Attacks Considering Geographic-Cyber Interdependence of the Power System and Communication Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 22 publications
1
16
0
Order By: Relevance
“…On the other hand, OPF strategies to redispatch generator and branch power flow is employed by defenders. Therefore, the mathematical model of microgrid confrontation in accordance with References [24][25][26][27][28][29] is formulated as follows:…”
Section: Confrontation With Symmetric Informationmentioning
confidence: 99%
“…On the other hand, OPF strategies to redispatch generator and branch power flow is employed by defenders. Therefore, the mathematical model of microgrid confrontation in accordance with References [24][25][26][27][28][29] is formulated as follows:…”
Section: Confrontation With Symmetric Informationmentioning
confidence: 99%
“…Derive an optimal solution x k + 1 and (η k + 1 , P 1 , …, P k , δ 1 , …, δ k ). Then, update LB = c T x k + 1 + η k + 1 step 3 fix x k + 1 and solve sub-problem (14), yield an optimal value Q(x k + 1 ) and contingency ŷ In contrast, for the proposed model, the load at bus 6 is likely to be shed due to the disconnection made by the possible contingencies, resulting in only 56.12 MW LS. This shedding is not the worst, but the probability is relatively large (i.e.…”
Section: Comparison Of Two Models On Decision Makingmentioning
confidence: 99%
“…In [11], a Q-learning-based simulation method is employed to analyse system vulnerability with consideration of physical system behaviours and to harden the entire system's performance. Manshadi and Khodayar [12], Sayyadipour et al [13] and Zeraati et al [14] find system weak links through a bi-level model (i.e. the power grid interdicting problem).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A new model based on binary optimization was proposed to assess the vulnerability of the power system, which was a geographical network interdependent with the communication network. The numerical results showed that the power system vulnerability might increase considering the physical network dependencies, and the location of the dispatch center can mitigate the impact of certain attacks [9]. [9] lacked an accurate description of the information network and used two weighting coefficients to describe the delay for possible communication delays.…”
Section: Introductionmentioning
confidence: 99%