2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control 2012
DOI: 10.1109/imccc.2012.117
|View full text |Cite
|
Sign up to set email alerts
|

Power Grid Vulnerability Identifying Based on Complex Network Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The second situation that the network encounters intentional attack is simulated by deliberately attacking special type nodes or edges. ③ Attacking nodes with high-degree (AN-HD): remove n nodes with the largest degree [14,15,25]. ④ Attacking nodes with high-betweenness (AN-HB): remove n nodes with the largest betweenness [15,25].…”
Section: B Topological Vulnerability Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The second situation that the network encounters intentional attack is simulated by deliberately attacking special type nodes or edges. ③ Attacking nodes with high-degree (AN-HD): remove n nodes with the largest degree [14,15,25]. ④ Attacking nodes with high-betweenness (AN-HB): remove n nodes with the largest betweenness [15,25].…”
Section: B Topological Vulnerability Analysismentioning
confidence: 99%
“…It further explains the importance of key node prediction of power grid. Guo et al [15] identified the vulnerability of the power grid network from the perspective of the local or global attributes, where the sorting algorithm based on node degree centrality (DC) was a simple local algorithm and the betweenness centrality (BC) used global information of the network. Wang et al [16] used node neighbor information and clustering coefficient, and proposed a new node importance evaluation method.…”
Section: Introductionmentioning
confidence: 99%
“…A network is simply a set of "entities" called nodes or vertices (in our case, stations in a power grid, or routers in Internet, one of the clearest examples of complex network) that are connected to each other by means of links or edges (correspondingly, lines in a power grid). The CN approach has been used to explore the robustness, stability (see definition in Table 1), and resilience of different networks in highly cited papers such as [19,38,61,[67][68][69][70][71][72][73] and, more recently, in [74][75][76][77][78][79][80][81][82][83][84][85][86][87][88]. The key topic of network robustness (or vulnerability, the opposite property) has strongly attracted the attention of researchers in very different scientific and technological fields (physics, mathematics, biology, telecommunications, energy, economy,...) [51,55,[57][58][59][60][61][62].…”
Section: Stabilitymentioning
confidence: 99%
“…The most popular vulnerability analyzing method is the use of complex network and graph theory to establish a network topology model. This model is helpful to assess the efficiency of the communication network [13], the structural vulnerability of the power network [14], or the overall vulnerability through inter-network dependency [15][16][17]. Hypergraph theory has been used to model the logical structure of SASs because it makes modeling a network with heterogeneous nodes or a network of networks feasible.…”
Section: Introductionmentioning
confidence: 99%