Skip navigation
Skip navigation

Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks

CHEN, Guo; Dong, Zhao Yang; Hill, David; Xue, Yusheng

Description

Recently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The...[Show more]

dc.contributor.authorCHEN, Guo
dc.contributor.authorDong, Zhao Yang
dc.contributor.authorHill, David
dc.contributor.authorXue, Yusheng
dc.date.accessioned2015-12-10T22:59:41Z
dc.identifier.issn0885-8950
dc.identifier.urihttp://hdl.handle.net/1885/61207
dc.description.abstractRecently, game theory has been used to design optimized strategies for defending an electric power system against deliberate attacks. In this paper, we extend the current static model to a more generalized framework which includes several interaction models between defenders and attackers. A new criterion of reliable strategies for defending power systems has been derived. In addition, two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. The new criterion and algorithms are complementary to current security criteria and can provide useful information for decision-makers to protect their power systems against possible targeted attacks. Numerical simulation examples using the proposed methods are given as well.
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE Inc)
dc.sourceIEEE Transactions on Power Systems
dc.subjectKeywords: Allocation algorithm; Decision makers; Interaction model; Power system security; reliable strategies; Static model; targeted attacks; Algorithms; Electric power systems; Game theory; Numerical methods; Risk management; Power transmission Game theory; power system security; reliable strategies; risk management; targeted attacks
dc.titleExploring Reliable Strategies for Defending Power Systems Against Targeted Attacks
dc.typeJournal article
local.description.notesImported from ARIES
local.identifier.citationvolumeOnline 2010
dc.date.issued2010
local.identifier.absfor090601 - Circuits and Systems
local.identifier.ariespublicationu4334215xPUB594
local.type.statusPublished Version
local.contributor.affiliationCHEN, Guo, College of Engineering and Computer Science, ANU
local.contributor.affiliationDong, Zhao Yang, Hong Kong Polytechnic University
local.contributor.affiliationHill, David, University of Sydney
local.contributor.affiliationXue, Yusheng, Nanjiing Automation Research Institute
local.description.embargo2037-12-31
local.bibliographicCitation.startpage10
local.identifier.doi10.1109/TPWRS.2010.2078524
local.identifier.absseo970110 - Expanding Knowledge in Technology
dc.date.updated2016-02-24T11:02:11Z
local.identifier.scopusID2-s2.0-79960851392
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_CHEN_Exploring_Reliable_Strategies_2010.pdf416.73 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  19 May 2020/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator