2021
DOI: 10.1016/j.segan.2021.100521
|View full text |Cite
|
Sign up to set email alerts
|

Cellular automata-based simulation of cross-space transmission of Energy Local Area Network risks: A case study of a power supply station in Beijing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 37 publications
0
4
0
1
Order By: Relevance
“…The classic approach considers such impacts (or attacks) as an accidental (unintentional) occurrence. The corresponding models are the error tolerance model [7]; "forest fire"-based models [8], including the one with immune trees [9]; demon model [10]; cellular automata-based model [11,12]; and random attack percolation models [13,14]. The latter ones, including the targeted attack percolation models [15][16][17][18], localized attack percolation models [19], and k-core percolation [20][21][22][23], are also used to simulate the intentional attacks on a network's nodes and edges, assuming that the Attacker tries to disrupt the network connectivity as quickly as possible.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The classic approach considers such impacts (or attacks) as an accidental (unintentional) occurrence. The corresponding models are the error tolerance model [7]; "forest fire"-based models [8], including the one with immune trees [9]; demon model [10]; cellular automata-based model [11,12]; and random attack percolation models [13,14]. The latter ones, including the targeted attack percolation models [15][16][17][18], localized attack percolation models [19], and k-core percolation [20][21][22][23], are also used to simulate the intentional attacks on a network's nodes and edges, assuming that the Attacker tries to disrupt the network connectivity as quickly as possible.…”
Section: Introductionmentioning
confidence: 99%
“…Cellular automata-based model [11,12] (2) Attacker-Defender, Defender-Attacker, Defender-Attacker-Defender models [24,25] Targeted attack percolation models [15][16][17][18] Localized attack percolation models [19] k-core percolation [20][21][22][23] Interdependent networks robustness under targeted attacks [34] Intentional (3) Cascading failure propagation models [26,27] Regular allocation strategy of bidirectional interconnections [28] (4) Cascading failure propagation model for networks of networks [29][30][31] The structure of the study is as follows. Section 2 describes the general statement of the problem of managing the risks of the complex system under attack with a known structure.…”
Section: Introductionmentioning
confidence: 99%
“…Penggunaan VLAN akan membuat pengaturan jaringan menjadi sangat fleksibel, sehingga dapat dibuat segmen yang bergantung pada organisasi atau departemen, tanpa bergantung pada lokasi workstation (Nourildean et al, 2021;Tulloh et al, 2015). Perbedaan yang sangat jelas dari model jaringan Local Area Network dengan Virtual Local Area Network adalah bahwa bentuk jaringan dengan model Local Area Network sangat bergantung pada letak/fisik dari workstation, serta penggunaan hub dan repeater sebagai perangkat jaringan yang memiliki beberapa kelemahan (Li et al, 2021;Qiang, 2021). Sedangkan yang menjadi salah satu kelebihan dari model jaringan dengan VLAN adalah tiap-tiap workstation/user yang tergabung dalam satu VLAN/ bagian (organisasi atau kelompok) dapat tetap saling berhubungan walaupun terpisah secara fisik.…”
Section: Pendahuluanunclassified
“…Therefore, under the high penetration ratio of new energy, promoting the stable operation of electricity spot market transactions is the main research topic. [1] . Some researchers put forward a quantitative analysis method to analyze the influence of new energy on the spot market of electricity.…”
Section: Introductionmentioning
confidence: 99%