메뉴 건너뛰기




Volumn 9, Issue 3, 2014, Pages 451-463

Integrated security analysis on cascading failure in complex networks

Author keywords

cascading failure; Complex network security; extended topological analysis; structural vulnerability

Indexed keywords

CASCADING FAILURES; COMPREHENSIVE MODEL; ELECTRICAL CHARACTERISTIC; FACTOR-BASED MODEL; NETWORK STRUCTURES; PHYSICAL PRINCIPLES; STRUCTURAL VULNERABILITY; TOPOLOGICAL ANALYSIS;

EID: 84896814191     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2299404     Document Type: Article
Times cited : (107)

References (58)
  • 1
    • 41349094978 scopus 로고    scopus 로고
    • Cascade-based attacks on complex networks
    • Dec.
    • A. E. Motter and Y.-C. Lai, "Cascade-based attacks on complex networks," Phys. Rev. E, vol. 66, no. 6, pp. 065102-1-065102-4, Dec. 2002.
    • (2002) Phys. Rev. e , vol.66 , Issue.6 , pp. 0651021-0651024
    • Motter, A.E.1    Lai, Y.-C.2
  • 2
    • 42749108762 scopus 로고    scopus 로고
    • Model for cascading failures in complex networks
    • Apr.
    • P. Crucitti, V. Latora, and M. Mariori, "Model for cascading failures in complex networks," Phys. Rev. E, vol. 69, no. 4, pp. 045104-1-045104-4, Apr. 2004.
    • (2004) Phys. Rev. e , vol.69 , Issue.4 , pp. 0451041-0451044
    • Crucitti, P.1    Latora, V.2    Mariori, M.3
  • 3
    • 40749140380 scopus 로고    scopus 로고
    • Universal robustness characteristic of weighted networks against cascading failure
    • Feb.
    • W.-X. Wang and G. Chen, "Universal robustness characteristic of weighted networks against cascading failure," Phys. Rev. E, vol. 77, no. 2, pp. 026101-1-026101-4, Feb. 2008.
    • (2008) Phys. Rev. e , vol.77 , Issue.2 , pp. 0261011-0261014
    • Wang, W.-X.1    Chen, G.2
  • 4
    • 33750253882 scopus 로고    scopus 로고
    • U.S.-Canada Power System Outage Task Force, Final report on the Aug. 14, 2003 blackout in the United States and Canada: Causes and recommendations Ottawa, Canada Apr.
    • U.S.-Canada Power System Outage Task Force, "Final report on the Aug. 14, 2003 blackout in the United States and Canada: Causes and recommendations," Power System Outage Task Force, Ottawa, Canada, Apr. 2004.
    • (2004) Power System Outage Task Force
  • 5
    • 84879522714 scopus 로고    scopus 로고
    • Report of the enquiry committee on grid disturbance in northern region on 30th July 2012 and in northern, eastern & north-eastern region on 31st July 2012
    • New Delhi, India, Tech. Rep., Aug.
    • S. C. Srivastava, A. Velayutham, and A. S. Bakshi, "Report of the enquiry committee on grid disturbance in northern region on 30th July 2012 and in northern, eastern & north-eastern region on 31st July 2012," Enquiry Committee of the Ministry of Power, New Delhi, India, Tech. Rep., Aug. 2012.
    • (2012) Enquiry Committee of the Ministry of Power
    • Srivastava, S.C.1    Velayutham, A.2    Bakshi, A.S.3
  • 6
    • 84155167232 scopus 로고    scopus 로고
    • Cyber-physical security of a smart grid infrastructure
    • Jan.
    • Y. Mo, T.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, et al., "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 195-209
    • Mo, Y.1    Kim, T.-J.2    Brancik, K.3    Dickinson, D.4    Lee, H.5    Perrig, A.6
  • 7
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • Jan.
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 8
    • 84864865604 scopus 로고    scopus 로고
    • Securing smart grid: Cyber attacks, countermeasures, and challenges
    • Aug.
    • X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, "Securing smart grid: Cyber attacks, countermeasures, and challenges," IEEE Commun. Mag., vol. 50, no. 8, pp. 38-45, Aug. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.8 , pp. 38-45
    • Li, X.1    Liang, X.2    Lu, R.3    Shen, X.4    Lin, X.5    Zhu, H.6
  • 9
    • 84864868854 scopus 로고    scopus 로고
    • Smart attacks in smart grid communication networks
    • Aug.
    • P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Smart attacks in smart grid communication networks," IEEE Commun. Mag., vol. 50, no. 8, pp. 24-29, Aug. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.8 , pp. 24-29
    • Chen, P.-Y.1    Cheng, S.-M.2    Chen, K.-C.3
  • 10
    • 84860251424 scopus 로고    scopus 로고
    • Risk assessment of cascading outages: Methodologies and challenges
    • May
    • M. Vaiman, K. Bell, Y. Chen, B. Chowdhury, I. Dobson, P. Hines, et al., "Risk assessment of cascading outages: Methodologies and challenges," IEEE Trans. Power Syst., vol. 27, no. 2, pp. 631-641, May 2012.
    • (2012) IEEE Trans. Power Syst. , vol.27 , Issue.2 , pp. 631-641
    • Vaiman, M.1    Bell, K.2    Chen, Y.3    Chowdhury, B.4    Dobson, I.5    Hines, P.6
  • 11
    • 82155162476 scopus 로고    scopus 로고
    • Malicious data attacks on the smart grid
    • Dec.
    • O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 645-658
    • Kosut, O.1    Jia, L.2    Thomas, R.3    Tong, L.4
  • 12
    • 82155185205 scopus 로고    scopus 로고
    • Distributed Internet-based load altering attacks against smart power grids
    • Dec.
    • A. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internet-based load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 667-674
    • Mohsenian-Rad, A.1    Leon-Garcia, A.2
  • 13
    • 84865517174 scopus 로고    scopus 로고
    • Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks
    • Sep.
    • G. Hug and J. Giampapa, "Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks," IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1362-1370, Sep. 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.3 , pp. 1362-1370
    • Hug, G.1    Giampapa, J.2
  • 14
    • 84911932080 scopus 로고    scopus 로고
    • Revealing cascading failure vulnerability in power grids using risk-graph
    • Syst., to be published doi: 10.1109/TPDS.2013.2295814
    • Y. Zhu, J. Yan, Y. Sun, and H. He, "Revealing cascading failure vulnerability in power grids using risk-graph," IEEE Trans. Parallel Distrib. Syst., to be published, doi: 10.1109/TPDS.2013.2295814
    • IEEE Trans. Parallel Distrib
    • Zhu, Y.1    Yan, J.2    Sun, Y.3    He, H.4
  • 15
    • 2542628960 scopus 로고    scopus 로고
    • Analysis of electric grid security under terrorist threat
    • May
    • J. Salmeron, K. Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004.
    • (2004) IEEE Trans. Power Syst. , vol.19 , Issue.2 , pp. 905-912
    • Salmeron, J.1    Wood, K.2    Baldick, R.3
  • 16
    • 79151480639 scopus 로고    scopus 로고
    • Effect of short-term riskaversive dispatch on a complex system model for power systems
    • Feb.
    • R. Fitzmaurice, A. Keane, and M. O'Malley, "Effect of short-term riskaversive dispatch on a complex system model for power systems," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 460-469, Feb. 2011.
    • (2011) IEEE Trans. Power Syst. , vol.26 , Issue.1 , pp. 460-469
    • Fitzmaurice, R.1    Keane, A.2    O'Malley, M.3
  • 17
    • 34547239425 scopus 로고    scopus 로고
    • Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization Chaos, Interdiscipl
    • I. Dobson, B. A. Carreras, V. E. Lynch, and D. E. Newman, "Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization," Chaos, Interdiscipl. J. Nonlinear Sci., vol. 17, no. 2, p. 026103, 2007.
    • (2007) J. Nonlinear Sci. , vol.17 , Issue.2 , pp. 026103
    • Dobson, I.1    Carreras, B.A.2    Lynch, V.E.3    Newman, D.E.4
  • 18
    • 4744344337 scopus 로고    scopus 로고
    • Evidence for self-organized criticality in a time series of electric power system blackouts
    • Sep.
    • B. A. Carreras, D. E. Newman, I. Dobson, and A. B. Poole, "Evidence for self-organized criticality in a time series of electric power system blackouts," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 51, no. 9, pp. 1733-1740, Sep. 2004.
    • (2004) IEEE Trans. Circuits Syst. I, Reg. Papers , vol.51 , Issue.9 , pp. 1733-1740
    • Carreras, B.A.1    Newman, D.E.2    Dobson, I.3    Poole, A.B.4
  • 19
    • 0036924741 scopus 로고    scopus 로고
    • Critical points and transitions in an electric power transmission model for cascading failure blackouts
    • DOI 10.1063/1.1505810
    • B. A. Carreras, V. E. Lynch, I. Dobson, and D. E. Newman, "Critical points and transitions in an electric power transmission model for cascading failure blackouts," Chaos, Interdiscipl. J. Nonlinear Sci., vol. 12, no. 4, pp. 985-994, 2002. (Pubitemid 36046844)
    • (2002) Chaos , vol.12 , Issue.4 , pp. 985-994
    • Carreras, B.A.1    Lynch, V.E.2    Dobson, I.3    Newman, D.E.4
  • 21
    • 84864281207 scopus 로고    scopus 로고
    • A random chemistry' algorithm for identifying collections of multiple contingencies that initiate cascading failure
    • Aug.
    • M. Eppstein and P. Hines, "A 'random chemistry' algorithm for identifying collections of multiple contingencies that initiate cascading failure," IEEE Trans. Power Syst., vol. 27, no. 3, pp. 1698-1705, Aug. 2012.
    • (2012) IEEE Trans. Power Syst. , vol.27 , Issue.3 , pp. 1698-1705
    • Eppstein, M.1    Hines, P.2
  • 23
    • 84886425139 scopus 로고    scopus 로고
    • Markov game analysis for attackdefense of power networks under possible misinformation
    • May
    • C. Ma, D. Yau, X. Lou, and N. Rao, "Markov game analysis for attackdefense of power networks under possible misinformation," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1676-1686, May 2013.
    • (2013) IEEE Trans. Power Syst. , vol.28 , Issue.2 , pp. 1676-1686
    • Ma, C.1    Yau, D.2    Lou, X.3    Rao, N.4
  • 24
    • 84878876582 scopus 로고    scopus 로고
    • An entropybased metric to quantify the robustness of power grids against cascading failures
    • Mar.
    • Y. Koç, M. Warnier, R. E. Kooij, and F. M. Brazier, "An entropybased metric to quantify the robustness of power grids against cascading failures," Safety Sci., vol. 59, pp. 126-134, Mar. 2013.
    • (2013) Safety Sci. , vol.59 , pp. 126-134
    • Koç, Y.1    Warnier, M.2    Kooij, R.E.3    Brazier, F.M.4
  • 25
    • 69749100394 scopus 로고    scopus 로고
    • An information-theoretic view of network-aware malware attacks
    • Sep.
    • Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 530-541, Sep. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.3 , pp. 530-541
    • Chen, Z.1    Ji, C.2
  • 27
    • 38949211589 scopus 로고    scopus 로고
    • Robustness of the European power grids under intentional attack
    • R. V. Solè, M. Rosas-Casals, B. Corominas-Murtra, and S. Valverde, "Robustness of the European power grids under intentional attack," Phys. Rev. E, vol. 77, no. 2, pp. 026102-1-026102-7, 2008.
    • (2008) Phys. Rev. e , vol.77 , Issue.2 , pp. 0261021-0261027
    • Solè, R.V.1    Rosas-Casals, M.2    Corominas-Murtra, B.3    Valverde, S.4
  • 28
    • 0031074985 scopus 로고    scopus 로고
    • Topological analysis in bulk power system reliability evaluation
    • S. Jonnavithula and R. Billinton, "Topological analysis in bulk power system reliability evaluation," IEEE Trans. Power Syst., vol. 12, no. 1, pp. 456-463, Feb. 1997. (Pubitemid 127771395)
    • (1997) IEEE Transactions on Power Systems , vol.12 , Issue.1 , pp. 456-463
    • Jonnavithula, S.1    Billinton, R.2
  • 29
    • 84886380771 scopus 로고    scopus 로고
    • Multi-contingency cascading analysis of smart grid based on self-organizing map
    • Apr.
    • J. Yan, Y. Zhu, H. He, and Y. Sun, "Multi-contingency cascading analysis of smart grid based on self-organizing map," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 646-656, Apr. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.4 , pp. 646-656
    • Yan, J.1    Zhu, Y.2    He, H.3    Sun, Y.4
  • 30
    • 42749103823 scopus 로고    scopus 로고
    • Structural vulnerability of the North American power grid
    • Feb.
    • R. Albert, I. Albert, and G. L. Nakarado, "Structural vulnerability of the North American power grid," Phys. Rev. E, vol. 69, p. 025103, Feb. 2004.
    • (2004) Phys. Rev. e , vol.69 , pp. 025103
    • Albert, R.1    Albert, I.2    Nakarado, G.L.3
  • 31
    • 84880337866 scopus 로고    scopus 로고
    • Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability Chaos, Interdiscipl
    • M. Ouyang, "Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability," Chaos, Interdiscipl. J. Nonlinear Sci., vol. 23, no. 2, p. 023114, 2013.
    • (2013) J. Nonlinear Sci. , vol.23 , Issue.2 , pp. 023114
    • Ouyang, M.1
  • 32
    • 84870485080 scopus 로고    scopus 로고
    • Comparing the topological and electrical structure of the North American electric power infrastructure
    • Dec.
    • E. Cotilla-Sanchez, P. Hines, C. Barrows, and S. Blumsack, "Comparing the topological and electrical structure of the North American electric power infrastructure," IEEE Syst. J., vol. 6, no. 4, pp. 616-626, Dec. 2012.
    • (2012) IEEE Syst. J. , vol.6 , Issue.4 , pp. 616-626
    • Cotilla-Sanchez, E.1    Hines, P.2    Barrows, C.3    Blumsack, S.4
  • 33
    • 79952910081 scopus 로고    scopus 로고
    • Topological models and critical slowing down: Two approaches to power system blackout risk analysis
    • Jan.
    • P. Hines, E. Cotilla-Sanchez, and S. Blumsack, "Topological models and critical slowing down: Two approaches to power system blackout risk analysis," in Proc. 44th HICSS, Jan. 2011, pp. 1-10.
    • (2011) Proc. 44th HICSS , pp. 1-10
    • Hines, P.1    Cotilla-Sanchez, E.2    Blumsack, S.3
  • 34
    • 78649403784 scopus 로고    scopus 로고
    • Do topological models provide good information about electricity infrastructure vulnerability? Chaos, Interdiscipl
    • P. Hines, E. Cotilla-Sanchez, and S. Blumsack, "Do topological models provide good information about electricity infrastructure vulnerability?" Chaos, Interdiscipl. J. Nonlinear Sci., vol. 20, no. 3, p. 033122, 2010.
    • (2010) J. Nonlinear Sci. , vol.20 , Issue.3 , pp. 033122
    • Hines, P.1    Cotilla-Sanchez, E.2    Blumsack, S.3
  • 35
    • 77953342320 scopus 로고    scopus 로고
    • Bilevel programming applied to power system vulnerability analysis under multiple contingencies
    • Feb.
    • J. M. Arroyo, "Bilevel programming applied to power system vulnerability analysis under multiple contingencies," IET Generat., Transmiss. & Distrib., vol. 4, no. 2, pp. 178-190, Feb. 2010.
    • (2010) IET Generat., Transmiss. & Distrib. , vol.4 , Issue.2 , pp. 178-190
    • Arroyo, J.M.1
  • 36
    • 84863028646 scopus 로고    scopus 로고
    • Economic analysis of the N-k power grid contingency selection and evaluation by graph algorithms and interdiction methods
    • N. Fan, H. Xu, F. Pan, and P. Pardalos, "Economic analysis of the N-k power grid contingency selection and evaluation by graph algorithms and interdiction methods," Energy Syst., vol. 2, nos. 3-4, pp. 313-324, 2011.
    • (2011) Energy Syst. , vol.2 , Issue.3-4 , pp. 313-324
    • Fan, N.1    Xu, H.2    Pan, F.3    Pardalos, P.4
  • 37
    • 84865486248 scopus 로고    scopus 로고
    • Extended topological metrics for the analysis of power grid vulnerability
    • Sep.
    • E. Bompard, E. Pons, and D. Wu, "Extended topological metrics for the analysis of power grid vulnerability," IEEE Syst. J., vol. 6, no. 3, pp. 481-487, Sep. 2012.
    • (2012) IEEE Syst. J. , vol.6 , Issue.3 , pp. 481-487
    • Bompard, E.1    Pons, E.2    Wu, D.3
  • 38
    • 77954159822 scopus 로고    scopus 로고
    • Extended topological approach for the assessment of structural vulnerability in transmission networks
    • Jun.
    • E. Bompard, R. Napoli, and F. Xue, "Extended topological approach for the assessment of structural vulnerability in transmission networks," IET Generat., Transmiss. Distrib., vol. 4, no. 6, pp. 716-724, Jun. 2010.
    • (2010) IET Generat., Transmiss. Distrib. , vol.4 , Issue.6 , pp. 716-724
    • Bompard, E.1    Napoli, R.2    Xue, F.3
  • 39
    • 70349421162 scopus 로고    scopus 로고
    • Assessment of structural vulnerability for power grids by network performance based on complex networks
    • E. Bompard, M. Masera, R. Napoli, and F. Xue, "Assessment of structural vulnerability for power grids by network performance based on complex networks," in Proc. Critical Inf. Infrastruct. Security, pp. 144-154, 2009.
    • (2009) Proc. Critical Inf. Infrastruct. Security , pp. 144-154
    • Bompard, E.1    Masera, M.2    Napoli, R.3    Xue, F.4
  • 42
  • 43
    • 69749094234 scopus 로고    scopus 로고
    • On reliability and security of randomized detectors against sensitivity analysis attacks
    • Sep.
    • M. El Choubassi and P. Moulin, "On reliability and security of randomized detectors against sensitivity analysis attacks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 273-283, Sep. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.3 , pp. 273-283
    • El Choubassi, M.1    Moulin, P.2
  • 44
    • 0344033604 scopus 로고    scopus 로고
    • Variation of distribution factors with loading
    • Nov.
    • R. Baldick, "Variation of distribution factors with loading," IEEE Trans. Power Syst., vol. 18, no. 4, pp. 1316-1323, Nov. 2003.
    • (2003) IEEE Trans. Power Syst. , vol.18 , Issue.4 , pp. 1316-1323
    • Baldick, R.1
  • 45
    • 68349130530 scopus 로고    scopus 로고
    • DC power flow revisited
    • Aug.
    • B. Stott, J. Jardim, and O. Alsac, "DC power flow revisited," IEEE Trans. Power Syst., vol. 24, no. 3, pp. 1290-1300, Aug. 2009.
    • (2009) IEEE Trans. Power Syst. , vol.24 , Issue.3 , pp. 1290-1300
    • Stott, B.1    Jardim, J.2    Alsac, O.3
  • 46
    • 79956065270 scopus 로고    scopus 로고
    • Structural vulnerability of power systems: A topological approach
    • E. Bompard, D. Wu, and F. Xue, "Structural vulnerability of power systems: A topological approach," Electr. Power Syst. Res., vol. 81, no. 7, pp. 1334-1340, 2011.
    • (2011) Electr. Power Syst. Res. , vol.81 , Issue.7 , pp. 1334-1340
    • Bompard, E.1    Wu, D.2    Xue, F.3
  • 47
    • 43849089098 scopus 로고    scopus 로고
    • Severe multiple contingency screening in electric power systems
    • DOI 10.1109/TPWRS.2008.919243
    • V. Donde, V. Lòpez, B. Lesieutre, A. Pinar, C. Yang, and J. Meza, "Severe multiple contingency screening in electric power systems," IEEE Trans. Power Syst., vol. 23, no. 2, pp. 406-417, May 2008. (Pubitemid 351695819)
    • (2008) IEEE Transactions on Power Systems , vol.23 , Issue.2 , pp. 406-417
    • Donde, V.1    Lopez, V.2    Lesieutre, B.3    Pinar, A.4    Yang, C.5    Meza, J.6
  • 48
    • 84863117924 scopus 로고    scopus 로고
    • Risk aware attacks and catastrophic cascading failures in U.S.Power grid
    • Dec.
    • W. Wang, Q. Cai, Y. Sun, and H. He, "Risk-aware attacks and catastrophic cascading failures in U.S. power grid," in Proc. IEEE GLOBECOM, Dec. 2011, pp. 1-6.
    • (2011) Proc. IEEE GLOBECOM , pp. 1-6
    • Wang, W.1    Cai, Q.2    Sun, Y.3    He, H.4
  • 49
    • 84876926986 scopus 로고    scopus 로고
    • Revealing temporal features of attacks against smart grid
    • Feb.
    • J. Yan, Y. Zhu, H. He, and Y. Sun, "Revealing temporal features of attacks against smart grid," in Proc. IEEE PES ISGT, Feb. 2013, pp. 1-6.
    • (2013) Proc. IEEE PES ISGT , pp. 1-6
    • Yan, J.1    Zhu, Y.2    He, H.3    Sun, Y.4
  • 50
    • 84886376602 scopus 로고    scopus 로고
    • Risk-aware vulnerability analysis of electric grids from attacker's perspective
    • Feb.
    • Y. Zhu, J. Yan, Y. Sun, and H. He, "Risk-aware vulnerability analysis of electric grids from attacker's perspective," in Proc. IEEE PES ISGT, Feb. 2013, pp. 1-6.
    • (2013) Proc. IEEE PES ISGT , pp. 1-6
    • Zhu, Y.1    Yan, J.2    Sun, Y.3    He, H.4
  • 52
    • 35349003438 scopus 로고    scopus 로고
    • Network topologies and transmission investment under electric-industry restructuring
    • Ph.D. dissertation Dept Carnegie Mellon Univ., Pittsburgh, PA, USA
    • S. Blumsack, "Network topologies and transmission investment under electric-industry restructuring," Ph.D. dissertation, Dept. Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA, 2006.
    • (2006) Comput. Sci.
    • Blumsack, S.1
  • 53
    • 79151479984 scopus 로고    scopus 로고
    • Matpower: Steady-state operations, planning, and analysis tools for power systems research and education
    • Feb.
    • R. Zimmerman, C. Murillo-Sanchez, and R. Thomas, "Matpower: Steady-state operations, planning, and analysis tools for power systems research and education," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12-19, Feb. 2011.
    • (2011) IEEE Trans. Power Syst. , vol.26 , Issue.1 , pp. 12-19
    • Zimmerman, R.1    Murillo-Sanchez, C.2    Thomas, R.3
  • 55
    • 84864274415 scopus 로고    scopus 로고
    • Initial review of methods for cascading failure analysis in electric power transmission systems IEEE PES CAMS task force on understanding, prediction, mitigation and restoration of cascading failures
    • Delivery Electr. Energy, Jul.
    • R. Baldick, B. Chowdhury, I. Dobson, Z. Dong, B. Gou, D. Hawkins, et al., "Initial review of methods for cascading failure analysis in electric power transmission systems IEEE PES CAMS task force on understanding, prediction, mitigation and restoration of cascading failures," in Proc. IEEE 21st Century Power Energy Soc. General Meeting Convers. Delivery Electr. Energy, Jul. 2008, pp. 1-8.
    • (2008) Proc. IEEE 21st Century Power Energy Soc. General Meeting Convers , pp. 1-8
    • Baldick, R.1    Chowdhury, B.2    Dobson, I.3    Dong, Z.4    Gou, B.5    Hawkins, D.6
  • 58
    • 18944382536 scopus 로고    scopus 로고
    • Identifying high risk N-k contingencies for online security assessment
    • DOI 10.1109/TPWRS.2005.846065
    • Q. Chen and J. McCalley, "Identifying high risk N-k contingencies for online security assessment," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 823-834, May 2005. (Pubitemid 40699713)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.2 , pp. 823-834
    • Chen, Q.1    McCalley, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.