메뉴 건너뛰기




Volumn 26, Issue 3, 2011, Pages 1000-1009

Exploring reliable strategies for defending power systems against targeted attacks

Author keywords

Game theory; power system security; reliable strategies; risk management; targeted attacks

Indexed keywords

ALLOCATION ALGORITHM; DECISION MAKERS; INTERACTION MODEL; POWER SYSTEM SECURITY; RELIABLE STRATEGIES; STATIC MODEL; TARGETED ATTACKS;

EID: 79960851392     PISSN: 08858950     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRS.2010.2078524     Document Type: Article
Times cited : (89)

References (25)
  • 1
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • Aug.
    • R. Powell, "Defending against terrorist attacks with limited resources," Amer. Polit. Sci. Rev., vol. 101, no. 3, pp. 527-541, Aug. 2007.
    • (2007) Amer. Polit. Sci. Rev. , vol.101 , Issue.3 , pp. 527-541
    • Powell, R.1
  • 2
    • 79960881626 scopus 로고    scopus 로고
    • DHS 2009, Washington, DC, Department of Homeland Security. [Online]. Available
    • DHS 2009, The 2009 National Infrastructure Protection Plan. Washington, DC, Department of Homeland Security. [Online]. Available: http://www.dhs.gov.
    • The 2009 National Infrastructure Protection Plan
  • 3
    • 67650104289 scopus 로고    scopus 로고
    • An improved model for structural vulnerability analysis of power networks
    • G. Chen et al., "An improved model for structural vulnerability analysis of power networks," Physica A, vol. 388, pp. 4259-4266, 2009.
    • (2009) Physica A , vol.388 , pp. 4259-4266
    • Chen, G.1
  • 4
    • 49249134848 scopus 로고    scopus 로고
    • Long-term effect of n-1 criterion on cascading line outages in an evolving power transmission grid
    • Aug.
    • H. Ren, I. Dobson, and B. A. Carreras, "Long-term effect of n-1 criterion on cascading line outages in an evolving power transmission grid," IEEE Trans. Power Syst., vol. 23, no. 3, pp. 1217-1225, Aug. 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.3 , pp. 1217-1225
    • Ren, H.1    Dobson, I.2    Carreras, B.A.3
  • 5
    • 18944382536 scopus 로고    scopus 로고
    • Identifying high risk N-k contingencies for online security assessment
    • DOI 10.1109/TPWRS.2005.846065
    • Q. Chen and J. McCalley, "Identifying high risk N-k contingencies for online security assessment," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 823-834, May 2005. (Pubitemid 40699713)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.2 , pp. 823-834
    • Chen, Q.1    McCalley, J.D.2
  • 6
    • 70350568786 scopus 로고    scopus 로고
    • Attack structural vulnerability of complex power grids: A hybrid approach based on complex networks
    • G. Chen et al., "Attack structural vulnerability of complex power grids: A hybrid approach based on complex networks," Physica A, vol. 389, pp. 595-603, 2010.
    • (2010) Physica A , vol.389 , pp. 595-603
    • Chen, G.1
  • 7
    • 0004225134 scopus 로고    scopus 로고
    • Washington, DC: National Academy Press, Committee on Science and Technology for Countering Terrorism, National Research Council
    • Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Washington, DC: National Academy Press, 2002, Committee on Science and Technology for Countering Terrorism, National Research Council.
    • (2002) Making the Nation Safer: The Role of Science and Technology in Countering Terrorism
  • 8
    • 2542628960 scopus 로고    scopus 로고
    • Analysis of electric grid security under terrorist threat
    • May
    • J. Salmeron, K. Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004.
    • (2004) IEEE Trans. Power Syst. , vol.19 , Issue.2 , pp. 905-912
    • Salmeron, J.1    Wood, K.2    Baldick, R.3
  • 9
    • 18944385541 scopus 로고    scopus 로고
    • On the solution of the bilevel programming formulation of the terrorist threat problem
    • DOI 10.1109/TPWRS.2005.846198
    • J. M. Arroyo and F. D. Galiana, "On the solution of the bilevel programming formulation of the terrorist threat problem," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 789-797, May 2005. (Pubitemid 40699709)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.2 , pp. 789-797
    • Arroyo, J.M.1    Galiana, F.D.2
  • 10
    • 24944442583 scopus 로고    scopus 로고
    • A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat
    • DOI 10.1109/TPWRS.2005.851942
    • A. Motto, J. M. Arroyo, and F. D. Galiana, "A mixed integer LP procedure for the analysis of electric grid security under disruptive threat," IEEE Trans. Power Syst., vol. 20, no. 3, pp. 1357-1365, Aug. 2005. (Pubitemid 41300948)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.3 , pp. 1357-1365
    • Motto, A.L.1    Arroyo, J.M.2    Galiana, F.D.3
  • 15
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic modeling of terrorist threat: A systems analysis approach to setting priorities among countermeasures
    • Dec.
    • E. Cornell and S. Guikema, "Probabilistic modeling of terrorist threat: A systems analysis approach to setting priorities among countermeasures," Military Oper. Res., vol. 7, no. 4, pp. 5-20, Dec. 2002.
    • (2002) Military Oper. Res. , vol.7 , Issue.4 , pp. 5-20
    • Cornell, E.1    Guikema, S.2
  • 16
    • 52049099149 scopus 로고    scopus 로고
    • A Stackelberg equilibrium for a missile procurement problem
    • Feb.
    • R. Hohzaki and S. Nagashima, "A Stackelberg equilibrium for a missile procurement problem," Eur. J. Oper. Res., vol. 193, pp. 238-249, Feb. 2009.
    • (2009) Eur. J. Oper. Res. , vol.193 , pp. 238-249
    • Hohzaki, R.1    Nagashima, S.2
  • 17
    • 33947365606 scopus 로고    scopus 로고
    • Evaluating strategies for defending electric power networks against antagonistic attacks
    • DOI 10.1109/TPWRS.2006.889080
    • A. Holmgren, E. Jenelius, and J.Westin, "Evaluating strategies for defending electric power networks against antagonistic attacks," IEEE Trans. Power Syst., vol. 22, no. 1, pp. 76-84, Feb. 2007. (Pubitemid 46442139)
    • (2007) IEEE Transactions on Power Systems , vol.22 , Issue.1 , pp. 76-84
    • Holmgren, A.J.1    Jenelius, E.2    Westin, J.3
  • 18
    • 0004260006 scopus 로고
    • 3rd ed. New York: Academic
    • G. Owen, Game Theory, 3rd ed. New York: Academic, 1995.
    • (1995) Game Theory
    • Owen, G.1
  • 20
  • 22
    • 84972513554 scopus 로고
    • On general minimax theorems
    • M. Sion, "On general minimax theorems," Pacific J. Math., no. 8, pp. 171-176, 1958.
    • (1958) Pacific J. Math. , Issue.8 , pp. 171-176
    • Sion, M.1
  • 23
    • 0043242618 scopus 로고
    • Numerical methods for finding saddle points, USSR comp
    • V. F. Demyanov and A. B. Pevnyi, "Numerical methods for finding saddle points, USSR comp," Math. Math. Phys., no. 12, pp. 1099-1127, 1972.
    • (1972) Math. Math. Phys. , Issue.12 , pp. 1099-1127
    • Demyanov, V.F.1    Pevnyi, A.B.2
  • 24
    • 0032592961 scopus 로고    scopus 로고
    • The IEEE reliability test system-1996
    • Aug.
    • R. Allan and R. Billinton, "The IEEE reliability test system-1996," IEEE Trans. Power Syst., vol. 14, no. 3, pp. 1010-1020, Aug. 1999.
    • (1999) IEEE Trans. Power Syst. , vol.14 , Issue.3 , pp. 1010-1020
    • Allan, R.1    Billinton, R.2
  • 25
    • 14844322217 scopus 로고    scopus 로고
    • Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model
    • DOI 10.1016/j.ijepes.2004.12.003, PII S0142061505000232
    • J. Chen, J. S. Thorp, and I. Dobson, "Cascading dynamics and mitigation assessment in power system disturbance via a hidden failure model," Elect. Power Energy Syst., vol. 27, pp. 318-326, 2005. (Pubitemid 40340011)
    • (2005) International Journal of Electrical Power and Energy Systems , vol.27 , Issue.4 , pp. 318-326
    • Chen, J.1    Thorp, J.S.2    Dobson, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.