Y Zhu, J Yan, Y Sun, H He - IEEE Transactions on Parallel and …, 2014 - ieeexplore.ieee.org
Security issues related to power grid networks have attracted the attention of researchers in many fields. Recently, a new network model that combines complex network theories with …
M Ouyang, L Zhao, Z Pan, L Hong - Physica A: Statistical Mechanics and its …, 2014 - Elsevier
Many scholars have applied complex network based models to investigate power grid vulnerability, but how effective are these models to capture the real performance is an …
G Chen, ZY Dong, DJ Hill, GH Zhang - Physica A: Statistical Mechanics and …, 2009 - Elsevier
Electric power networks have been studied as a typical example of real-world complex networks. Traditional models for structural vulnerability analysis appear to be all based on …
J Yan, H He, Y Sun - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
The security issue of complex networks has drawn significant concerns recently. While pure topological analyzes from a network security perspective provide some effective techniques …
GJ Correa, JM Yusta - Electric Power Systems Research, 2013 - Elsevier
Graph theory techniques have emerged as useful tools in analysis of the physical performance of power grids, especially cascade failure events. Based on such models …
A Abedi, L Gaudard, F Romerio - Reliability Engineering & System Safety, 2019 - Elsevier
The failure of a power system as a critical infrastructure causes considerable damage to society. Hence, the vulnerabilities of such facilities should be minimized to cope with several …
The cascading failure phenomenon in a power grid is related to both the structural aspects (number and types of buses, density of transmission lines and interconnection of …
S Arianos, E Bompard, A Carbone… - Chaos: An Interdisciplinary …, 2009 - pubs.aip.org
Power grids exhibit patterns of reaction to outages similar to complex networks. Blackout sequences follow power laws, as complex systems operating near a critical point. Here, the …
JW Wang, LL Rong - Safety science, 2009 - Elsevier
The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety. Applying the real data of the US …