2014
DOI: 10.1109/tpds.2013.2295814
|View full text |Cite
|
Sign up to set email alerts
|

Revealing cascading failure vulnerability in power grids using risk-graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
82
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 141 publications
(82 citation statements)
references
References 20 publications
0
82
0
Order By: Relevance
“…The CN community, including part of the electrical engineering community [91], argue that the CN approach does not aim to reflect the detailed operation of a given grid, but to discover the possible emergence of a systemic or collective behavior, beyond that of its single components. This is supported by a number of high-impact works [86,[92][93][94][95][96][97]. An interesting example of its feasibility is the appearance of synchronization in smart grids [36].…”
Section: Discussion: Is the Cn Approach Useful In Power Grids?mentioning
confidence: 94%
“…The CN community, including part of the electrical engineering community [91], argue that the CN approach does not aim to reflect the detailed operation of a given grid, but to discover the possible emergence of a systemic or collective behavior, beyond that of its single components. This is supported by a number of high-impact works [86,[92][93][94][95][96][97]. An interesting example of its feasibility is the appearance of synchronization in smart grids [36].…”
Section: Discussion: Is the Cn Approach Useful In Power Grids?mentioning
confidence: 94%
“…So, it is more suitable using weighted entropy method to identify the vulnerable lines. For example, if only considering the structure importance, the vulnerability of the line 6 breaks, the generators 33,34 will be off-grid, which will bring dangers to the system balance. As shown in Table 1, the vulnerability of the 16 19  is much higher than that of the 6 11  breaks, which means, vulnerable line identification based on weighted entropy model proposed in this paper can more fully identify vulnerable line by considering the influence to the flow transfer margin and grid structure changes.…”
Section: Identification Of Vulnerable Lines In Ieee 39-bus Systemmentioning
confidence: 99%
“…Recently, several typical methods on vulnerability identification have been researched, including probabilistic methodology [4], fault chain theory [5], risk graph theory [6], complex network theory [7][8], entropy theory [9]. According to the main modeling ideas, they can be divided into two methods.…”
Section: Introductionmentioning
confidence: 99%
“…Given their importance, the robustness of communication networks has attracted much attention in recent years. Previous studies [3], [4] have found that cascading failures are very common in complex networks. Owing to the heterogeneity of the network and the interaction of different parts, even a single failure can cause the entire network to collapse.…”
Section: Introductionmentioning
confidence: 96%