메뉴 건너뛰기




Volumn 60, Issue 2, 2011, Pages 394-403

Assessing the vulnerability of a power system through a multiple objective contingency screening approach

Author keywords

Contingency screening; interdiction; multi objective evolutionary optimization; power system security

Indexed keywords

ALTERNATIVE APPROACH; ANALYZING POWER; CONTINGENCY SCREENING; DECISION MAKERS; EVOLUTIONARY OPTIMIZATIONS; HYBRID MODEL; INTERDICTION; MULTI OBJECTIVE; MULTI-OBJECTIVE OPTIMIZATION EVOLUTIONARY ALGORITHMS; MULTIPLE OBJECTIVES; NETWORK INTERDICTION PROBLEMS; POWER SYSTEM SECURITY; POWER SYSTEMS; RANDOM FAILURES; SCREENING APPROACHES; SURROGATE APPROACH; SYSTEM DISTURBANCES; SYSTEM LOADS;

EID: 79958012668     PISSN: 00189529     EISSN: None     Source Type: Journal    
DOI: 10.1109/TR.2011.2135490     Document Type: Article
Times cited : (56)

References (59)
  • 1
    • 18644364822 scopus 로고    scopus 로고
    • A screening methodology for the identification and ranking of infrastructures vulnerability due to terrorism
    • G. E. Apostolakis and D. M. Lemon, "A screening methodology for the identification and ranking of infrastructures vulnerability due to terrorism," Risk Analysis, vol. 25, no. 1, p. 361, 2005.
    • (2005) Risk Analysis , vol.25 , Issue.1 , pp. 361
    • Apostolakis, G.E.1    Lemon, D.M.2
  • 2
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • V.M. Bier, A. Nagaraj, and V. Abhichandani, "Protection of simple series and parallel systems with components of different values," Reliability Engineering and System Safety, vol. 87, no. 3, p. 315, 2005.
    • (2005) Reliability Engineering and System Safety , vol.87 , Issue.3 , pp. 315
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 3
    • 78650817483 scopus 로고    scopus 로고
    • Source-sink network protection against diverse interdictor strategy via evolutionary techniques & considering continuous defense efforts
    • J. E. Ramirez-Marquez, C. Rocco, and G. Levitin, "Source-sink network protection against diverse interdictor strategy via evolutionary techniques & considering continuous defense efforts," Reliability Engineering & System Safety, vol. 96, no. 3, p. 374, 2011.
    • (2011) Reliability Engineering & System Safety , vol.96 , Issue.3 , pp. 374
    • Ramirez-Marquez, J.E.1    Rocco, C.2    Levitin, G.3
  • 4
  • 5
    • 34047142655 scopus 로고    scopus 로고
    • Optimal defense strategy against intentional attacks
    • G. Levitin, "Optimal defense strategy against intentional attacks," IEEE Transactions on Reliability, vol. 56, no. 1, p. 148, 2007.
    • (2007) IEEE Transactions on Reliability , vol.56 , Issue.1 , pp. 148
    • Levitin, G.1
  • 6
    • 36849025453 scopus 로고    scopus 로고
    • Importance of protections against intentional attacks
    • G. Levitin and H. Ben-Haim, "Importance of protections against intentional attacks," Reliability Engineering and System Safety, vol. 93, no. 4, p. 639, 2007.
    • (2007) Reliability Engineering and System Safety , vol.93 , Issue.4 , pp. 639
    • Levitin, G.1    Ben-Haim, H.2
  • 7
    • 43249094557 scopus 로고    scopus 로고
    • Protection vs. redundancy in homogeneous parallel systems
    • G. Levitin and K. Hausken, "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, vol. 93, no. 10, p. 1444, 2007.
    • (2007) Reliability Engineering and System Safety , vol.93 , Issue.10 , pp. 1444
    • Levitin, G.1    Hausken, K.2
  • 8
    • 0036089074 scopus 로고    scopus 로고
    • The role of risk analysis in the protection of critical infrastructures against terrorism
    • Y. Haimes and T. Longstaff, "The role of risk analysis in the protection of critical infrastructures against terrorism," Risk Analysis, vol. 22, no. 3, p. 439, 2002.
    • (2002) Risk Analysis , vol.22 , Issue.3 , pp. 439
    • Haimes, Y.1    Longstaff, T.2
  • 9
    • 56149088059 scopus 로고    scopus 로고
    • Protecting infrastructures from strategic attackers
    • Specialisation Topics Taylor & Francis ISBN: 978-0-415-44783-6
    • K. Hausken, "Protecting infrastructures from strategic attackers," in Risk, Reliability and Societal Safety, 2007, vol. 1, Specialisation Topics, Taylor & Francis, p. 881, ISBN: 978-0-415-44783-6.
    • (2007) Risk, Reliability and Societal Safety , vol.1 , pp. 881
    • Hausken, K.1
  • 11
  • 12
    • 33947365606 scopus 로고    scopus 로고
    • Evaluating strategies for defending electric power networks against antagonistic attacks
    • A. Holmgren, E. Jenelius, and J.Westin, "Evaluating strategies for defending electric power networks against antagonistic attacks," IEEE Transactions on Power Systems, vol. 22, no. 1, p. 76, 2006.
    • (2006) IEEE Transactions on Power Systems , vol.22 , Issue.1 , pp. 76
    • Holmgren, A.1    Jenelius, E.2    Westin, J.3
  • 13
    • 33748439665 scopus 로고    scopus 로고
    • Using graph models to analyze the vulnerability of electric power networks
    • A. Holmgren, "Using graph models to analyze the vulnerability of electric power networks," Risk Analysis, vol. 26, no. 4, p. 955, 2006.
    • (2006) Risk Analysis , vol.26 , Issue.4 , pp. 955
    • Holmgren, A.1
  • 14
    • 33847391280 scopus 로고    scopus 로고
    • Understanding the interaction between public policy, managerial decision-making and the engineering of critical infrastructures
    • C. Johnson, "Understanding the interaction between public policy, managerial decision-making and the engineering of critical infrastructures, " Reliability Engineering and System Safety, vol. 92, no. 9, p. 1141, 2007.
    • (2007) Reliability Engineering and System Safety , vol.92 , Issue.9 , pp. 1141
    • Johnson, C.1
  • 18
    • 0034138347 scopus 로고    scopus 로고
    • State extension for adequacy evaluation of composite power systems-applications
    • R. Billinton and W. Zhang, "State extension for adequacy evaluation of composite power systems-applications," IEEE Transactions on Power Systems, vol. 15, no. 1, p. 427, 2000.
    • (2000) IEEE Transactions on Power Systems , vol.15 , Issue.1 , pp. 427
    • Billinton, R.1    Zhang, W.2
  • 19
    • 0031258420 scopus 로고    scopus 로고
    • Structure optimization of power system with different redundant elements
    • G. Levitin, A. Lisnianski, and D. Elmakis, "Structure optimization of power system with different redundant elements," Electric Power Systems Research, vol. 43, p. 19, 1997.
    • (1997) Electric Power Systems Research , vol.43 , pp. 19
    • Levitin, G.1    Lisnianski, A.2    Elmakis, D.3
  • 20
    • 79958009288 scopus 로고    scopus 로고
    • Increasing infrastructure resilience through competitive coevolution
    • S. Travis and D. Tauritz, "Increasing infrastructure resilience through competitive coevolution," New Mathematics and Natural Computation, vol. 5, no. 2, p. 441, 2009.
    • (2009) New Mathematics and Natural Computation , vol.5 , Issue.2 , pp. 441
    • Travis, S.1    Tauritz, D.2
  • 24
    • 2542628960 scopus 로고    scopus 로고
    • Analysis of electric grid security under terrorist threat
    • J. Salmerón, K. Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Transactions on Power Systems, vol. 19, no. 2, p. 905, 2004.
    • (2004) IEEE Transactions on Power Systems , vol.19 , Issue.2 , pp. 905
    • Salmerón, J.1    Wood, K.2    Baldick, R.3
  • 26
    • 79952959479 scopus 로고
    • An interdiction model of highway transportationRAND Research Memorandum
    • E. Durbin, An interdiction model of highway transportationRAND Research Memorandum, RM-4945-PR, 1966.
    • (1966) RM-4945-PR
    • Durbin, E.1
  • 29
    • 79957996930 scopus 로고
    • Partial Enumeration for Planar Network Interdiction Problems
    • Naval Postgraduate School
    • M. Boyle, "Partial Enumeration for Planar Network Interdiction Problems," Master of Science Dissertation Thesis, Naval Postgraduate School, 1988.
    • (1988) Master of Science Dissertation Thesis
    • Boyle, M.1
  • 30
    • 38249007197 scopus 로고
    • Deterministic network interdiction
    • K. Wood, "Deterministic network interdiction," Mathematical and Computer Modeling, vol. 17, p. 1, 1993.
    • (1993) Mathematical and Computer Modeling , vol.17 , pp. 1
    • Wood, K.1
  • 32
    • 54149090598 scopus 로고    scopus 로고
    • Deterministic network interdiction optimization via an evolutionary approach
    • C. Rocco and J. E. Ramirez-Marquez, "Deterministic network interdiction optimization via an evolutionary approach," Reliability Engineering and System Safety, vol. 94, no. 2, p. 568, 2009.
    • (2009) Reliability Engineering and System Safety , vol.94 , Issue.2 , pp. 568
    • Rocco, C.1    Ramirez-Marquez, J.E.2
  • 34
    • 18944397931 scopus 로고    scopus 로고
    • Interdicting electrical power grids
    • Naval Postgraduate School, Monterey, CA
    • R. Álvarez, "Interdicting Electrical Power Grids," Master of Science Dissertation Thesis, Naval Postgraduate School, Monterey, CA, 2004.
    • (2004) Master of Science Dissertation Thesis
    • Álvarez, R.1
  • 36
    • 18944385541 scopus 로고    scopus 로고
    • On the solution of the bilevel programming formulation of the terrorist threat problem
    • J. Arroyo and F. Galiana, "On the solution of the bilevel programming formulation of the terrorist threat problem," IEEE Transactions on Power Systems, vol. 20, no. 2, p. 789, 2005.
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.2 , pp. 789
    • Arroyo, J.1    Galiana, F.2
  • 37
    • 23144435998 scopus 로고    scopus 로고
    • A necessary condition of power Jacobian singularity based on branch complex flows
    • S. Grjialva and P. W. Sauer, "A necessary condition of power Jacobian singularity based on branch complex flows," IEEE Transactions on Circuits and Systems-I, vol. 52, no. 7, p. 1406, 2005.
    • (2005) IEEE Transactions on Circuits and Systems-I , vol.52 , Issue.7 , pp. 1406
    • Grjialva, S.1    Sauer, P.W.2
  • 40
    • 0030081868 scopus 로고    scopus 로고
    • Genetic algorithm-based method for contingency screening in power systems
    • H. Saitoh, Y. Takano, and J. Toyoda, "Genetic algorithm-based method for contingency screening in power systems," Electrical Engineering in Japan, vol. 116, no. 2, p. 99.
    • Electrical Engineering in Japan , vol.116 , Issue.2 , pp. 99
    • Saitoh, H.1    Takano, Y.2    Toyoda, J.3
  • 41
  • 44
    • 77953866273 scopus 로고    scopus 로고
    • Influence of the topology on the power flux of the Italian high-voltage electrical network
    • in press
    • V. Rosato, L. Issacharoff, and S. Bologna, "Influence of the topology on the power flux of the Italian high-voltage electrical network," Europhysics Letters, 2010, (in press).
    • (2010) Europhysics Letters
    • Rosato, V.1    Issacharoff, L.2    Bologna, S.3
  • 48
    • 62349137043 scopus 로고    scopus 로고
    • Evolutionary multi-objective optimization: Some current research trends and topics that remain to be explored
    • C. Coello, "Evolutionary multi-objective optimization: some current research trends and topics that remain to be explored," Frontiers of Computer Science in China, vol. 3, no. 1, p. 18, 2009.
    • (2009) Frontiers of Computer Science in China , vol.3 , Issue.1 , pp. 18
    • Coello, C.1
  • 52
    • 33644978280 scopus 로고    scopus 로고
    • Evolutionary multiobjective optimization: A historical view of the field
    • C. Coello, "Evolutionary multiobjective optimization: A historical view of the field," IEEE Computational Intelligence Magazine, vol. 1, no. 1, p. 28, 2006.
    • (2006) IEEE Computational Intelligence Magazine , vol.1 , Issue.1 , pp. 28
    • Coello, C.1
  • 55
    • 79251610757 scopus 로고    scopus 로고
    • Bi and tri-objective optimization in the deterministic network interdiction problem
    • C. Rocco, J. E. Ramirez-Marquez, and D. Salazar, "Bi and tri-objective optimization in the deterministic network interdiction problem," Reliability Engineering & System Safety, vol. 95, no. 8, p. 887, 2010.
    • (2010) Reliability Engineering & System Safety , vol.95 , Issue.8 , pp. 887
    • Rocco, C.1    Ramirez-Marquez, J.E.2    Salazar, D.3
  • 56
    • 33748744238 scopus 로고    scopus 로고
    • Topological properties of high-voltage electrical transmission networks
    • V. Rosato, S. Bologna, and F. Tiriticco, "Topological properties of high-voltage electrical transmission networks," Electric Power Systems Research, vol. 77, no. 2, p. 99, 2007.
    • (2007) Electric Power Systems Research , vol.77 , Issue.2 , pp. 99
    • Rosato, V.1    Bologna, S.2    Tiriticco, F.3
  • 57
    • 60549112826 scopus 로고    scopus 로고
    • Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery
    • J. E. Ramirez-Marquez and C. Rocco, "Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery," Reliability Engineering and System Safety, vol. 94, no. 5, p. 913, 2009.
    • (2009) Reliability Engineering and System Safety , vol.94 , Issue.5 , pp. 913
    • Ramirez-Marquez, J.E.1    Rocco, C.2
  • 58
    • 77952241821 scopus 로고    scopus 로고
    • Multi-objective redundancy allocation optimization using a variable neighborhood search algorithm
    • DOI 10.1007/s10732-009-9108-4
    • Y. Liang and M. Lo, "Multi-objective redundancy allocation optimization using a variable neighborhood search algorithm," Journal of Heuristics, DOI 10.1007/s10732-009-9108-4.
    • Journal of Heuristics
    • Liang, Y.1    Lo, M.2
  • 59
    • 38049129816 scopus 로고    scopus 로고
    • Vulnerability assessment of power system using radial basis function neural network and a new feature extraction method
    • A. Haidar, A. Mohamed, and A. Hussain, "Vulnerability assessment of power system using radial basis function neural network and a new feature extraction method," American Journal of Applied Sciences, vol. 5, no. 6, p. 705, 2008.
    • (2008) American Journal of Applied Sciences , vol.5 , Issue.6 , pp. 705
    • Haidar, A.1    Mohamed, A.2    Hussain, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.