메뉴 건너뛰기




Volumn 18, Issue 8, 2008, Pages 820-834

Vulnerability of interconnected power systems to malicious attacks under limited information

Author keywords

Interconnected power systems; Multi agent systems; Physical and cyber security; Power system security

Indexed keywords

ELECTRIC POWER SYSTEM INTERCONNECTION; ELECTRIC POWER SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; INTERCONNECTION NETWORKS; POWER GENERATION; POWER TRANSMISSION; REINFORCEMENT;

EID: 56749169569     PISSN: 1430144X     EISSN: 15463109     Source Type: Journal    
DOI: 10.1002/etep.274     Document Type: Article
Times cited : (22)

References (26)
  • 1
    • 56749131687 scopus 로고    scopus 로고
    • A preliminary road map for future research, a coordination action on ICT vulnerabilities of power systems and the relevant defense methodologies, GRID Consortium
    • A preliminary road map for future research - a coordination action on ICT vulnerabilities of power systems and the relevant defense methodologies, GRID Consortium, http://grid.jrc.it
  • 2
    • 33947365606 scopus 로고    scopus 로고
    • Evaluating strategies for defending electric power networks against antagonistic attacks
    • Holmgren AJ, Jenelius E, Westin J. Evaluating strategies for defending electric power networks against antagonistic attacks. IEEE Transactions on Power Systems 2007; 22(1):76-84.
    • (2007) IEEE Transactions on Power Systems , vol.22 , Issue.1 , pp. 76-84
    • Holmgren, A.J.1    Jenelius, E.2    Westin, J.3
  • 4
    • 24944442583 scopus 로고    scopus 로고
    • A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat
    • Motto AL, Arroyo JM, Galiana FD. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat. IEEE Transactions On Power Systems 2005; 20(3):1357-1365.
    • (2005) IEEE Transactions On Power Systems , vol.20 , Issue.3 , pp. 1357-1365
    • Motto, A.L.1    Arroyo, J.M.2    Galiana, F.D.3
  • 5
    • 18944385541 scopus 로고    scopus 로고
    • On the solution of the bilevel programming formulation of the terrorist threat problem
    • Arroyo JM, Galiana FD. On the solution of the bilevel programming formulation of the terrorist threat problem. IEEE Transactions On Power Systems 2005; 20(2):789-797.
    • (2005) IEEE Transactions On Power Systems , vol.20 , Issue.2 , pp. 789-797
    • Arroyo, J.M.1    Galiana, F.D.2
  • 6
    • 35348812520 scopus 로고    scopus 로고
    • Anjia M, Jiaxi Y, Zhizhong G. Electric power grid structural vulnerability assessment. IEEE Power Engineering Society General Meeting 2006, 18-22 June 2006; 6.
    • Anjia M, Jiaxi Y, Zhizhong G. Electric power grid structural vulnerability assessment. IEEE Power Engineering Society General Meeting 2006, 18-22 June 2006; 6.
  • 8
    • 9244246297 scopus 로고    scopus 로고
    • A practical approach for integrated power system vulnerability analysis with protection failures
    • Yu X, Singh C. A practical approach for integrated power system vulnerability analysis with protection failures. IEEE Transactions On Power Systems 2004; 19(4):1811-1820.
    • (2004) IEEE Transactions On Power Systems , vol.19 , Issue.4 , pp. 1811-1820
    • Yu, X.1    Singh, C.2
  • 9
    • 28244460605 scopus 로고    scopus 로고
    • Union for the Co-ordination of Transmission of Electricity, Online, Available
    • Operation Handbook. Union for the Co-ordination of Transmission of Electricity. [Online]. Available: http://www.ucte.org
    • Operation Handbook
  • 15
    • 0028425226 scopus 로고
    • A multi-agent technique for contingency constrained optimal power flows
    • TaluMar S, Ramesh VC. A multi-agent technique for contingency constrained optimal power flows. IEEE Transactions on Power Systems 1994; 9(2):855-861.
    • (1994) IEEE Transactions on Power Systems , vol.9 , Issue.2 , pp. 855-861
    • TaluMar, S.1    Ramesh, V.C.2
  • 18
    • 56749163254 scopus 로고    scopus 로고
    • Bompard E, Gao C, Masera M, et al. Approaches to the Security Analysis of Power Systems: Defence Strategies Against Malicious Threats. Office for Official Publications of the European Communities: Luxembourg, 2007; EUR 22683 EN, ISSN 1018-5593.
    • Bompard E, Gao C, Masera M, et al. Approaches to the Security Analysis of Power Systems: Defence Strategies Against Malicious Threats. Office for Official Publications of the European Communities: Luxembourg, 2007; EUR 22683 EN, ISSN 1018-5593.
  • 22
    • 0029724518 scopus 로고    scopus 로고
    • Social learning in a society of decentralized agents. Evolutionary computation
    • Namatame A. Social learning in a society of decentralized agents. Evolutionary computation. Proceedings of IEEE International Conference, 1996.
    • (1996) Proceedings of IEEE International Conference
    • Namatame, A.1
  • 26
    • 16244381482 scopus 로고    scopus 로고
    • Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
    • Shamma JS, Arslan G. Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria. IEEE Transactions on Automatic Control 2005; 50(3):312-327.
    • (2005) IEEE Transactions on Automatic Control , vol.50 , Issue.3 , pp. 312-327
    • Shamma, J.S.1    Arslan, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.