2019
DOI: 10.1049/iet-cps.2018.5080
|View full text |Cite
|
Sign up to set email alerts
|

Review of static risk‐based security assessment in power system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 50 publications
0
20
0
Order By: Relevance
“…With the development of risk theory in power systems and the practice in engineering applications, risk assessment has been gradually applied to various areas of the power industry, mainly including operational risk monitoring, equipment management, etc. [19]. In recent years, risk assessment technology has been employed in distributed power systems and active power distribution networks.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of risk theory in power systems and the practice in engineering applications, risk assessment has been gradually applied to various areas of the power industry, mainly including operational risk monitoring, equipment management, etc. [19]. In recent years, risk assessment technology has been employed in distributed power systems and active power distribution networks.…”
Section: Introductionmentioning
confidence: 99%
“…Research studies focused on the operational risk of DN mainly contain security risk and economic risk. In terms of security analysis method, it undergoes three stages: deterministic assessment [11,12], probabilistic assessment [13] and risk assessment [14][15][16][17]. Deterministic assessment is used to analyse the reliability level of power system or equipment under a certain expected state.…”
Section: Introductionmentioning
confidence: 99%
“…The probabilistic assessment applies the probability as an evaluation method but it lacks consideration about the severity of a contingency or an emergency. Different from the previous two methods, the operational security risk assessment of DN contains the analysis of probability as well as the severity of extreme events [11]. Probabilistic load flow (PLF) methodology is often applied in the risk assessment to obtain the expectation, variance and distribution of line power or node voltage [8,[18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To protect the complex power grid control networks of CPPS, it is necessary to perform the risk and vulnerability assessment under cyber-attacks [38][39][40]. The various methods of risk [41][42][43][44] and vulnerability assessment [45][46][47][48] from the component level to systemwide impacts, with cyber model assessment and physical model assessment, are performed. Substantial work on cyber-attack detection and mitigation for CPPS by monitoring the network traffic of the Supervisory Control and Data Acquisition(SCADA)/Phasor Measurement Unit(PMU) system in the power system control centre was performed in [49][50][51][52].…”
mentioning
confidence: 99%