Abstract – In the analysis of power systems security recently a new concern related to possible malicious attacks caught much attention. Coordination among different system operators (SO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a specific model for the analysis of information impacts in handling on-line security after a malicious attack. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision making process under attack. A 34-buses test system, with three systems intercon...
Power systems are exposed to various physical threats due to extreme events, technical failures, hum...
Due to the integration of information and internet, the power network has facing more and more uncer...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
In the analysis of power systems security, recently a new concern related to possible malicious atta...
The topic of critical infrastructures has shown the inadequacy of the standard security assessment a...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical...
International audienceThe protection and safe operations of power systems heavily rely on the identi...
The future grid is different from the current system, and requires more interactions between electri...
International audienceThe communication infrastructure is a key element for management and control o...
Recently, game theory has been used to design optimized strategies for defending an electric power s...
This paper analyses the impacts of credible contingency and an event of cyber attack on the dynamic ...
Abstract—Effective simulation of large-scale power system disturbances especially those stemming fro...
Abstract—Effective simulation of large-scale power system disturbances especially those stemming fro...
This paper describes a next-generation security information and event management (SIEM) platform tha...
The extensive integration of information and communication technology (ICT) in the future electrical...
Power systems are exposed to various physical threats due to extreme events, technical failures, hum...
Due to the integration of information and internet, the power network has facing more and more uncer...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
In the analysis of power systems security, recently a new concern related to possible malicious atta...
The topic of critical infrastructures has shown the inadequacy of the standard security assessment a...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical...
International audienceThe protection and safe operations of power systems heavily rely on the identi...
The future grid is different from the current system, and requires more interactions between electri...
International audienceThe communication infrastructure is a key element for management and control o...
Recently, game theory has been used to design optimized strategies for defending an electric power s...
This paper analyses the impacts of credible contingency and an event of cyber attack on the dynamic ...
Abstract—Effective simulation of large-scale power system disturbances especially those stemming fro...
Abstract—Effective simulation of large-scale power system disturbances especially those stemming fro...
This paper describes a next-generation security information and event management (SIEM) platform tha...
The extensive integration of information and communication technology (ICT) in the future electrical...
Power systems are exposed to various physical threats due to extreme events, technical failures, hum...
Due to the integration of information and internet, the power network has facing more and more uncer...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...