Abstract A key focus recently has been in assessing the risk of a coordinated cyber-physical attack and minimizing the impact of a successful attack. Most of the cyber-attackers will have limited system information and conventional power grid N − 1 security analysis cannot be extended to assess the risk. Centrality measures are widely used in the network science and an attacker with incomplete information can use it to identify power system vulnerabilities by defining the system as a complex network but without real-time system measurements. This paper presents a graph theory based centrality indices for vulnerability assessment of the power system due to various bus and branch contingencies using limited system information and provides a p...
Electrical grids have been developed over a century, which are considered as one of the most importa...
Security issues related to power grid networks have attracted the attention of researchers in many f...
Complex network theory has brought novel concepts and methodology to the study of power network vuln...
Abstract Due to the open data policies, nowadays, some countries have their power grid data availabl...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
Cascading failures are the typical reasons of blackouts in power grids. The grid topology plays an i...
In the last decade, the main attacks against smart grids have occurred in communication networks (IT...
Recent events demonstrated the vulnerability of power grids to cyber attacks and to physical attacks...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
Abstract—This paper introduces new analytical techniques for performing vulnerability analysis of st...
Cyber-physical systems are pervasive in every walk of life. The safety performances of these systems...
Abstract. Power grids vulnerability is a key issue in society. A compo-nent failure may trigger casc...
The aim of this paper is to propose modified centrality measures as a tool to identify critical node...
im po si o In te rn ac io na ls ob re 20 13 ABSTRACT — Usually vulnerability assessment of high volt...
Power networks are highly vulnerable to deliberate attacks. Whilst power-network design usually cons...
Electrical grids have been developed over a century, which are considered as one of the most importa...
Security issues related to power grid networks have attracted the attention of researchers in many f...
Complex network theory has brought novel concepts and methodology to the study of power network vuln...
Abstract Due to the open data policies, nowadays, some countries have their power grid data availabl...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
Cascading failures are the typical reasons of blackouts in power grids. The grid topology plays an i...
In the last decade, the main attacks against smart grids have occurred in communication networks (IT...
Recent events demonstrated the vulnerability of power grids to cyber attacks and to physical attacks...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
Abstract—This paper introduces new analytical techniques for performing vulnerability analysis of st...
Cyber-physical systems are pervasive in every walk of life. The safety performances of these systems...
Abstract. Power grids vulnerability is a key issue in society. A compo-nent failure may trigger casc...
The aim of this paper is to propose modified centrality measures as a tool to identify critical node...
im po si o In te rn ac io na ls ob re 20 13 ABSTRACT — Usually vulnerability assessment of high volt...
Power networks are highly vulnerable to deliberate attacks. Whilst power-network design usually cons...
Electrical grids have been developed over a century, which are considered as one of the most importa...
Security issues related to power grid networks have attracted the attention of researchers in many f...
Complex network theory has brought novel concepts and methodology to the study of power network vuln...