2020
DOI: 10.1109/jsyst.2020.2969023
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Based on Community Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
25
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(27 citation statements)
references
References 31 publications
1
25
0
1
Order By: Relevance
“…Zang et al (2019) introduced the power dispatching and control strategies, such as the AC power flow analysis, AC optimal flow analysis, and bus load shedding in their improved model. Some other improvements on the basis of the "one-to-one" undirected dependency-based model are presented in Yağan et al (2012), Wang et al (2016a), Liu et al (2019), and Pan et al (2020).…”
Section: Modeling Methods For Cascading Failures Of Cppssmentioning
confidence: 99%
“…Zang et al (2019) introduced the power dispatching and control strategies, such as the AC power flow analysis, AC optimal flow analysis, and bus load shedding in their improved model. Some other improvements on the basis of the "one-to-one" undirected dependency-based model are presented in Yağan et al (2012), Wang et al (2016a), Liu et al (2019), and Pan et al (2020).…”
Section: Modeling Methods For Cascading Failures Of Cppssmentioning
confidence: 99%
“…Each layer's operation is conceivable but does not certainly mean an interruption detection component or system prerequisites to be applied in the whole layer. Information can flow between entire layers as they maneuver merely in a cycle [38].…”
Section: A Causes Of Cyber-attacksmentioning
confidence: 99%
“…Initiating a cyberwar from a national power system against another country's national power system [17], [18], [19], [38], [57], [69] Large scale blackouts, turbulences, or financial losses…”
Section: Political Threatsmentioning
confidence: 99%
“…When classifying, we need to ensure that the various types of factors are independent of each other. There are mutually exclusive and compatible relations among factors in the same kind of factor set [8]. The fault alarm of grade j is marked as G j .…”
Section: Modelling the Correlation Between The Incentives And Alarms ...mentioning
confidence: 99%