2022
DOI: 10.1109/access.2022.3172686
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Critical Node Groups in Cyber-Physical Power Systems Based on Pinning Control Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…The uncertainty of power grid operation continues to increase, and frequent power outages cause serious economic losses and negative social impacts [1,2]. When the power grid fails, the critical nodes have a key role in the power grid, and may even cause the system to collapse gradually [3][4][5]. Therefore, it is important to precisely identify the critical nodes in the power grid to prevent power outages [6,7].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The uncertainty of power grid operation continues to increase, and frequent power outages cause serious economic losses and negative social impacts [1,2]. When the power grid fails, the critical nodes have a key role in the power grid, and may even cause the system to collapse gradually [3][4][5]. Therefore, it is important to precisely identify the critical nodes in the power grid to prevent power outages [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…[9] uses the link-based partitioning method to find the overlapping areas in the power grid and identifies the key nodes of the power grid using the betweenness centrality based on neighbor nodes (BCBNN) algorithm. In [3], a critical node evaluation method based on fixed control theory is proposed, which uses the minimum nonzero eigenvalue of the modified Laplace matrix. Ref.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, [22] constructed a secondary correlation network based on the N-2 contingency model and introduced the concept of node strength, thereby enhancing the effectiveness of identification. K-shell decomposition [21], H-index [22], structural holes [23], cascading fault space-time graph [24], and percolation control theory [25] have also found applications in the identification of vulnerable power lines. It is evident that the aforementioned approaches take into account the dynamic aspects of power system faults but may not adequately address the system's inherent topology.…”
mentioning
confidence: 99%