File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TPWRS.2010.2078524
- Scopus: eid_2-s2.0-79960851392
- WOS: WOS:000293711700004
- Find via
Supplementary
-
Bookmarks:
- CiteULike: 3
- Citations:
- Appears in Collections:
Article: Exploring reliable strategies for defending power systems against targeted attacks
Title | Exploring reliable strategies for defending power systems against targeted attacks |
---|---|
Authors | |
Keywords | Game Theory Power System Security Reliable Strategies Risk Management Targeted Attacks |
Issue Date | 2011 |
Publisher | I E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59 |
Citation | Ieee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009 How to Cite? |
Abstract | Recently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/169731 |
ISSN | 2023 Impact Factor: 6.5 2023 SCImago Journal Rankings: 3.827 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, G | en_US |
dc.contributor.author | Dong, ZY | en_US |
dc.contributor.author | Hill, DJ | en_US |
dc.contributor.author | Xue, YS | en_US |
dc.date.accessioned | 2012-10-25T04:54:29Z | - |
dc.date.available | 2012-10-25T04:54:29Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | Ieee Transactions On Power Systems, 2011, v. 26 n. 3, p. 1000-1009 | en_US |
dc.identifier.issn | 0885-8950 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/169731 | - |
dc.description.abstract | Recently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well. © 2011 IEEE. | en_US |
dc.language | eng | en_US |
dc.publisher | I E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=59 | en_US |
dc.relation.ispartof | IEEE Transactions on Power Systems | en_US |
dc.subject | Game Theory | en_US |
dc.subject | Power System Security | en_US |
dc.subject | Reliable Strategies | en_US |
dc.subject | Risk Management | en_US |
dc.subject | Targeted Attacks | en_US |
dc.title | Exploring reliable strategies for defending power systems against targeted attacks | en_US |
dc.type | Article | en_US |
dc.identifier.email | Hill, DJ: | en_US |
dc.identifier.authority | Hill, DJ=rp01669 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/TPWRS.2010.2078524 | en_US |
dc.identifier.scopus | eid_2-s2.0-79960851392 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-79960851392&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 26 | en_US |
dc.identifier.issue | 3 | en_US |
dc.identifier.spage | 1000 | en_US |
dc.identifier.epage | 1009 | en_US |
dc.identifier.isi | WOS:000293711700004 | - |
dc.publisher.place | United States | en_US |
dc.identifier.scopusauthorid | Chen, G=35077133200 | en_US |
dc.identifier.scopusauthorid | Dong, ZY=7402274708 | en_US |
dc.identifier.scopusauthorid | Hill, DJ=35398599500 | en_US |
dc.identifier.scopusauthorid | Xue, YS=7402270481 | en_US |
dc.identifier.citeulike | 9611485 | - |
dc.identifier.issnl | 0885-8950 | - |