File Download
 
Links for fulltext
(May Require Subscription)
 
Supplementary

Article: Exploring reliable strategies for defending power systems against targeted attacks
  • Basic View
  • Metadata View
  • XML View
TitleExploring reliable strategies for defending power systems against targeted attacks
 
AuthorsChen, G4
Dong, ZY3
Hill, DJ2 1
Xue, YS5
 
KeywordsGame Theory
Power System Security
Reliable Strategies
Risk Management
Targeted Attacks
 
Issue Date2011
 
PublisherI E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59
 
CitationIeee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009 [How to Cite?]
DOI: http://dx.doi.org/10.1109/TPWRS.2010.2078524
 
AbstractRecently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. © 2011 IEEE.
 
ISSN0885-8950
2013 Impact Factor: 3.530
2013 SCImago Journal Rankings: 3.293
 
DOIhttp://dx.doi.org/10.1109/TPWRS.2010.2078524
 
ISI Accession Number IDWOS:000293711700004
 
ReferencesReferences in Scopus
 
DC FieldValue
dc.contributor.authorChen, G
 
dc.contributor.authorDong, ZY
 
dc.contributor.authorHill, DJ
 
dc.contributor.authorXue, YS
 
dc.date.accessioned2012-10-25T04:54:29Z
 
dc.date.available2012-10-25T04:54:29Z
 
dc.date.issued2011
 
dc.description.abstractRecently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. © 2011 IEEE.
 
dc.description.naturelink_to_subscribed_fulltext
 
dc.identifier.citationIeee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009 [How to Cite?]
DOI: http://dx.doi.org/10.1109/TPWRS.2010.2078524
 
dc.identifier.citeulike9611485
 
dc.identifier.doihttp://dx.doi.org/10.1109/TPWRS.2010.2078524
 
dc.identifier.epage1009
 
dc.identifier.isiWOS:000293711700004
 
dc.identifier.issn0885-8950
2013 Impact Factor: 3.530
2013 SCImago Journal Rankings: 3.293
 
dc.identifier.issue3
 
dc.identifier.scopuseid_2-s2.0-79960851392
 
dc.identifier.spage1000
 
dc.identifier.urihttp://hdl.handle.net/10722/169731
 
dc.identifier.volume26
 
dc.languageeng
 
dc.publisherI E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59
 
dc.publisher.placeUnited States
 
dc.relation.ispartofIEEE Transactions on Power Systems
 
dc.relation.referencesReferences in Scopus
 
dc.subjectGame Theory
 
dc.subjectPower System Security
 
dc.subjectReliable Strategies
 
dc.subjectRisk Management
 
dc.subjectTargeted Attacks
 
dc.titleExploring reliable strategies for defending power systems against targeted attacks
 
dc.typeArticle
 
<?xml encoding="utf-8" version="1.0"?>
<item><contributor.author>Chen, G</contributor.author>
<contributor.author>Dong, ZY</contributor.author>
<contributor.author>Hill, DJ</contributor.author>
<contributor.author>Xue, YS</contributor.author>
<date.accessioned>2012-10-25T04:54:29Z</date.accessioned>
<date.available>2012-10-25T04:54:29Z</date.available>
<date.issued>2011</date.issued>
<identifier.citation>Ieee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009</identifier.citation>
<identifier.issn>0885-8950</identifier.issn>
<identifier.uri>http://hdl.handle.net/10722/169731</identifier.uri>
<description.abstract>Recently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. &#169; 2011 IEEE.</description.abstract>
<language>eng</language>
<publisher>I E E E. The Journal&apos;s web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59</publisher>
<relation.ispartof>IEEE Transactions on Power Systems</relation.ispartof>
<subject>Game Theory</subject>
<subject>Power System Security</subject>
<subject>Reliable Strategies</subject>
<subject>Risk Management</subject>
<subject>Targeted Attacks</subject>
<title>Exploring reliable strategies for defending power systems against targeted attacks</title>
<type>Article</type>
<description.nature>link_to_subscribed_fulltext</description.nature>
<identifier.doi>10.1109/TPWRS.2010.2078524</identifier.doi>
<identifier.scopus>eid_2-s2.0-79960851392</identifier.scopus>
<relation.references>http://www.scopus.com/mlt/select.url?eid=2-s2.0-79960851392&amp;selection=ref&amp;src=s&amp;origin=recordpage</relation.references>
<identifier.volume>26</identifier.volume>
<identifier.issue>3</identifier.issue>
<identifier.spage>1000</identifier.spage>
<identifier.epage>1009</identifier.epage>
<identifier.isi>WOS:000293711700004</identifier.isi>
<publisher.place>United States</publisher.place>
<identifier.citeulike>9611485</identifier.citeulike>
</item>
Author Affiliations
  1. NICTA
  2. University of Sydney
  3. Hong Kong Polytechnic University
  4. Australian National University
  5. State Grid