2019
DOI: 10.1155/2019/2817586
|View full text |Cite
|
Sign up to set email alerts
|

Survivability Evaluation Method for Cascading Failure of Electric Cyber Physical System Considering Load Optimal Allocation

Abstract: The scale of the electric cyber physical system (ECPS) is continuously extending, and the existing cascade failure models ignore both the information flow and power flow transferring characteristics and also lack effective survivability analysis. In this paper, the quantitative evaluation method for cascading failure of ECPS survivability considering optimal load allocation is proposed. Firstly, according to the system topological structure and correlation, the degree-betweenness weighted correlation matrix of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 37 publications
0
14
0
Order By: Relevance
“…where b is a mathematical expectation of the data packet transmission time; = ∑ -mathematical expectation of the intensity of restoring the functioning of network elements after the successful realization of the cyberattack; с = ∑ -mathematical expectation of the intensity of the information impact against network elements, each of which is accessible for the cybercriminal intelligence system, and realization of cyberattack with probability Pi [3,24]; = ̅ -coefficient that has the meaning of the probability of the successful operation of the network equipment when network traffic is absent until the time of the successful realization of the cyberattack, assuming that during the restoration of the function, the network element is not used for its intended purpose [24].…”
Section: The First Stagementioning
confidence: 99%
See 1 more Smart Citation
“…where b is a mathematical expectation of the data packet transmission time; = ∑ -mathematical expectation of the intensity of restoring the functioning of network elements after the successful realization of the cyberattack; с = ∑ -mathematical expectation of the intensity of the information impact against network elements, each of which is accessible for the cybercriminal intelligence system, and realization of cyberattack with probability Pi [3,24]; = ̅ -coefficient that has the meaning of the probability of the successful operation of the network equipment when network traffic is absent until the time of the successful realization of the cyberattack, assuming that during the restoration of the function, the network element is not used for its intended purpose [24].…”
Section: The First Stagementioning
confidence: 99%
“…By carrying out cyberattacks on automated systems and technological DTNs, malefactors disrupt the normal functioning of the power complex elements [3]. Therefore, the automation systems and technological DTNs that are being implemented in power complexes must provide operational management of energy resources, as well as meet the high cybersecurity requirements for both automation system elements and technological DTNs.…”
Section: Introductionmentioning
confidence: 99%
“…The experimental environment was constructed by designing the physical layer, cyber layer, and the coupling relationship as the research object [6].…”
Section: A Experimental Environment Designmentioning
confidence: 99%
“…With the continuous development of information technology, the interaction between information flow and energy flow in power systems is becoming more and more frequent (Yu and Xue, 2016;Xu et al, 2018;Qu et al, 2019). By integrating computing systems, communication networks and physical environments, traditional power systems have evolved into cyber-physical power systems (CPPS) (Yang et al, 2019;He et al, 2020).…”
Section: Introductionmentioning
confidence: 99%