W Wang, Q Cai, Y Sun, H He - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
The power grid network is a complex network which is subjected to attacks and cascading failures. In this paper, we study the vulnerabilities of power grid in terms of cascading …
Power grids have been studied as a typical example of real-world complex networks. Different from previous methods, this paper proposes a hybrid approach for structural …
M Ouyang, L Zhao, Z Pan, L Hong - Physica A: Statistical Mechanics and its …, 2014 - Elsevier
Many scholars have applied complex network based models to investigate power grid vulnerability, but how effective are these models to capture the real performance is an …
Due to the open data policies, nowadays, some countries have their power grid data available online. This may bring a new concern to the power grid operators in terms of …
J Yan, H He, Y Sun - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
The security issue of complex networks has drawn significant concerns recently. While pure topological analyzes from a network security perspective provide some effective techniques …
JW Wang, LL Rong - Safety science, 2011 - Elsevier
Power systems are the basic support of modern infrastructures and protecting them from random failures or intentional attacks is an active topic of research in safety science. This …
N Liu, X Hu, L Ma, X Yu - IEEE Transactions on Smart Grid, 2021 - ieeexplore.ieee.org
With the rapid development of EV in the transportation system, its increasing influence on the power system has attracted more and more attention in recent years. Under such a …
GJ Correa, JM Yusta - Electric Power Systems Research, 2013 - Elsevier
Graph theory techniques have emerged as useful tools in analysis of the physical performance of power grids, especially cascade failure events. Based on such models …
JW Wang, LL Rong - Safety science, 2009 - Elsevier
The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety. Applying the real data of the US …