메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1160-1168

Optimal budget deployment strategy against power grid interdiction

Author keywords

attacking cost; budget cost function; candidate line combination; optimal strategy; power system security; primal dual interior point method; redundant line combination

Indexed keywords

CANDIDATE LINE COMBINATION; OPTIMAL STRATEGIES; POWER SYSTEM SECURITY; PRIMAL-DUAL INTERIOR POINT METHODS; REDUNDANT LINE COMBINATION;

EID: 84883077214     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6566907     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 0030126334 scopus 로고
    • Anatomy of power system blackouts: Preventive relaying strategies
    • S. Tamronglak, S. H. Horowitz, A.G.Phadke and J.S.Thorp, Anatomy of power system blackouts: preventive relaying strategies, IEEE Trans. Power Syst, vol. 11, no. 2, pp. 708-723, 1995.
    • (1995) IEEE Trans. Power Syst , vol.11 , Issue.2 , pp. 708-723
    • Tamronglak, S.1    Horowitz, S.H.2    Phadke, A.G.3    Thorp, J.S.4
  • 2
    • 70350568786 scopus 로고    scopus 로고
    • Attack structural vulnerability of complex power grids: A hybrid approach based on complex networks
    • Feb
    • G. Chen, Z.Y. Dong, D. J.Hill, G. H. Zhang and K. Q. Hua, Attack structural vulnerability of complex power grids: A hybrid approach based on complex networks, Physica A, vol. 389, pp. 595-603, Feb, 2010.
    • (2010) Physica A , vol.389 , pp. 595-603
    • Chen, G.1    Dong, Z.Y.2    Hill, D.3    Zhang, G.H.4    Hua, K.Q.5
  • 3
    • 49249134848 scopus 로고    scopus 로고
    • Long-term effect of n-1 criterion on cascading line outages in an evolving power transmission grid
    • Aug
    • H. Ren, I. Dobson, and B. A. Carreras, Long-term effect of n-1 criterion on cascading line outages in an evolving power transmission grid, IEEE Trans. Power Syst., vol. 23, no. 3, pp. 1217-1225, Aug. 2008.
    • (2008) IEEE Trans. Power Syst , vol.23 , Issue.3 , pp. 1217-1225
    • Ren, H.1    Dobson, I.2    Carreras, B.A.3
  • 4
    • 18944382536 scopus 로고    scopus 로고
    • Identifying high risk N-k contingencies for online security assessment
    • May
    • Q. Chen and J. McCalley, Identifying high risk N-k contingencies for online security assessment, IEEE Trans. Power Syst., vol. 20, no. 2, pp. 823-834, May 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.2 , pp. 823-834
    • Chen, Q.1    McCalley, J.2
  • 5
    • 2542628960 scopus 로고    scopus 로고
    • Analysis of electric grid security under terrorist threat
    • May
    • S. Salmeron, K. Wood, and R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004.
    • (2004) IEEE Trans. Power Syst , vol.19 , Issue.2 , pp. 905-912
    • Salmeron, S.1    Wood, K.2    Baldick, R.3
  • 6
    • 18944385541 scopus 로고    scopus 로고
    • On the solution of the bilevel programming formulation of the terrorist threat problem
    • May
    • J. M. Arroyo and F. D. Galiana, On the solution of the bilevel programming formulation of the terrorist threat problem, IEEE Trans. Power Syst., vol. 20, no. 2, pp. 789-797, May 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.2 , pp. 789-797
    • Arroyo, J.M.1    Galiana, F.D.2
  • 7
    • 24944442583 scopus 로고    scopus 로고
    • A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat
    • Aug
    • A. L. Motto, J. M. Arroyo, and F. D. Galiana, A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat, IEEE Trans. Power Syst., vol. 20, no. 3, pp. 1357-1365, Aug. 2005.
    • (2005) IEEE Trans. Power Syst , vol.20 , Issue.3 , pp. 1357-1365
    • Motto, A.L.1    Arroyo, J.M.2    Galiana, F.D.3
  • 8
    • 33947365606 scopus 로고    scopus 로고
    • Evaluating strategies for defending electric power networks against antagonistic attacks
    • Feb
    • A. Holmgren, E. Jenelius, and J.Westin, Evaluating strategies for defending electric power networks against antagonistic attacks, IEEE Trans. Power Syst., vol. 22, no. 1, pp. 76-84, Feb. 2007.
    • (2007) IEEE Trans. Power Syst , vol.22 , Issue.1 , pp. 76-84
    • Holmgren, A.1    Jenelius, E.2    Westin, J.3
  • 9
    • 79960851392 scopus 로고    scopus 로고
    • Exploring reliable strategies for defending power systems against targeted attacks
    • Aug
    • G. Chen, Z.Y. Dong and D.J. Hill, Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks, IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1000-1009, Aug. 2011.
    • (2011) IEEE Trans. Power Syst , vol.26 , Issue.3 , pp. 1000-1009
    • Chen, G.1    Dong, Z.Y.2    Hill, D.J.3
  • 10
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Jun
    • Y. Yuan, Z. Li and K. Ren, Modeling Load Redistribution Attacks in Power Systems, IEEE Transaction on Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
    • (2011) IEEE Transaction on Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 11
    • 84864607132 scopus 로고    scopus 로고
    • Quantitative analysis of load redistribution attacks in electric grid
    • Y. Yuan, Z. Li and K. Ren, Quantitative Analysis of Load Redistribution Attacks in Electric Grid, IEEE Transaction on Parallel and Distribution Systems, vol. 23, no. 9, pp. 1731-1738.
    • IEEE Transaction on Parallel and Distribution Systems , vol.23 , Issue.9 , pp. 1731-1738
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 13
    • 84914405497 scopus 로고
    • Optimal power flow solutions
    • H. W. Dommell and W. F. Tinney, Optimal Power Flow Solutions, IEEE Trans. on PAS, Vol. 87, pp. 1866-1876.1968.
    • (1968) IEEE Trans. on PAS , vol.87 , pp. 1866-1876
    • Dommell, H.W.1    Tinney, W.F.2
  • 16
    • 14844322217 scopus 로고    scopus 로고
    • Cascading dynamics and mitigation assessment in power system disturbance via a hidden failure model
    • J. Chen, J. S. Thorp, and I. Dobson, Cascading dynamics and mitigation assessment in power system disturbance via a hidden failure model, Elect. Power Energy Syst., vol. 27, pp. 318-326, 2005.
    • (2005) Elect. Power Energy Syst , vol.27 , pp. 318-326
    • Chen, J.1    Thorp, J.S.2    Dobson, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.