Analysis on Power Grid Vulnerability Considering Cascading Failure of Branch
1
Citation
6
Reference
10
Related Paper
Citation Trend
Abstract:
This paper analyzes the network features of power grid with buses’ cascading failures based on the theories and methods of complex networks. And it concludes detailed vulnerability analysis of buses in Huazhong power grid under three forms of attack (maximum load attack, maximum degree attack and random attack) .It provides technical means for the prevention of cascading failure .Keywords:
Cascading failure
Vulnerability
Power grid
Power network
Vulnerability
Vulnerability index
Cite
Citations (0)
Vulnerability
Vulnerability management
Cite
Citations (1)
The application of computer network has mushroomed with the networking manufacture, networking instruments and etc. The ability of the production or system that can endures the breakage and the fault is a very important performance index. Especially today, the problems by reason of information security including hidden failures and defects in the system directly threaten the security and performance of system. This performance index to indicate these cases is the vulnerability. Networks vulnerability is defined as the abilities of network which to endure attacks, destroy and faults, also being called invulnerability of network. Vulnerability is often measured by the degree of vulnerability, which directly indicates the magnitude of invulnerability. This paper firstly introduces the conception of networks vulnerability, and distinct the analysis methods of networks vulnerability. The results of this paper are being looked forward to giving much direction on the system analysis and synthesis too.
Vulnerability
Vulnerability index
Vulnerability management
Cite
Citations (0)
The power system vulnerability is one of the research focuses.How to assess the network vulnerability and the potential danger,prevent the occurrence of cascading failures,is a challenge faced by power system operators.This paper reviews the research status for the vulnerability from both running state vulnerability and structural vulnerability and pointed out the research direction of power system vulnerability assessment.
Vulnerability
Power network
Cite
Citations (2)
The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.
Vulnerability
Physical security
Vulnerability management
Threat
Cite
Citations (0)
Vulnerability
Cite
Citations (5)
The role of vulnerability management and vulnerability assessment methods in ensuring cyber security of the enterprise is considered. The functional differences between them are analyzed. The use of vulnerability management technology as the best strategy for risk identification and elimination is substantiated and the optimal way to ensure it is identified. Recommendations have been developed for organizations to achieve the maximum result of the vulnerability management process.
Vulnerability
Vulnerability management
Security management
Threat
Identification
Cite
Citations (0)
Cascading failure of network features in power system is analyzed in this paper using complex network theory and method, and Central China power grid are analyzed in detail on the three kinds of attack forms (maximum load, the most generous attack and random attack) of regional vulnerability. It provides technical means for the prevention of cascading failure .
Cascading failure
Vulnerability
Power grid
Power network
Cite
Citations (0)
This chapter contains sections titled: Introduction Vulnerability Assessment and Control Vulnerability Assessment Challenges Conclusions References
Vulnerability
Cite
Citations (1)
The purpose of this study is to develop a vulnerability assessment model of explosive terrorism in multi-use buildings focusing mainly on architectural design elements. First, in order to extract the weights of each assessment element, expert surveys with four anti-terrorism specialists were conducted twice. The results imply that the risk of bomb attack in buildings is influenced more by the vulnerability of the layers of defense, the supplementary groups, and the scenarios of explosion than by the vulnerability of assessment elements. Second, the vulnerability assessment model was developed to calculate the vulnerability level of each layer of defense and scenario of explosive terrorism individually as well as the overall vulnerability level of a building. This model reflects the relative importance and supplementary effects of elements. Third, two multi-use buildings were assessed using the developed model to analyze the vulnerability level of each layer of defense, supplementary group, and the entire building. Based on the results of the case study, cost-efficient design alternatives to reduce the vulnerability of a building were presented.
Vulnerability
Vulnerability management
Cite
Citations (4)