File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Exploring reliable strategies for defending power systems against targeted attacks

TitleExploring reliable strategies for defending power systems against targeted attacks
Authors
KeywordsGame Theory
Power System Security
Reliable Strategies
Risk Management
Targeted Attacks
Issue Date2011
PublisherI E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59
Citation
Ieee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009 How to Cite?
AbstractRecently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. © 2011 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/169731
ISSN
2014 Impact Factor: 2.814
2014 SCImago Journal Rankings: 3.012
ISI Accession Number ID
References

 

DC FieldValueLanguage
dc.contributor.authorChen, Gen_US
dc.contributor.authorDong, ZYen_US
dc.contributor.authorHill, DJen_US
dc.contributor.authorXue, YSen_US
dc.date.accessioned2012-10-25T04:54:29Z-
dc.date.available2012-10-25T04:54:29Z-
dc.date.issued2011en_US
dc.identifier.citationIeee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009en_US
dc.identifier.issn0885-8950en_US
dc.identifier.urihttp://hdl.handle.net/10722/169731-
dc.description.abstractRecently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. © 2011 IEEE.en_US
dc.languageengen_US
dc.publisherI E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59en_US
dc.relation.ispartofIEEE Transactions on Power Systemsen_US
dc.subjectGame Theoryen_US
dc.subjectPower System Securityen_US
dc.subjectReliable Strategiesen_US
dc.subjectRisk Managementen_US
dc.subjectTargeted Attacksen_US
dc.titleExploring reliable strategies for defending power systems against targeted attacksen_US
dc.typeArticleen_US
dc.identifier.emailHill, DJ:en_US
dc.identifier.authorityHill, DJ=rp01669en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1109/TPWRS.2010.2078524en_US
dc.identifier.scopuseid_2-s2.0-79960851392en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-79960851392&selection=ref&src=s&origin=recordpageen_US
dc.identifier.volume26en_US
dc.identifier.issue3en_US
dc.identifier.spage1000en_US
dc.identifier.epage1009en_US
dc.identifier.isiWOS:000293711700004-
dc.publisher.placeUnited Statesen_US
dc.identifier.scopusauthoridChen, G=35077133200en_US
dc.identifier.scopusauthoridDong, ZY=7402274708en_US
dc.identifier.scopusauthoridHill, DJ=35398599500en_US
dc.identifier.scopusauthoridXue, YS=7402270481en_US
dc.identifier.citeulike9611485-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats