The impact of coordinated malicious attacks may be dramatically severe and may yield a wide area blackout. A preventive measure is enhancing the infrastructure through investment. Due to limited budget, a decision making is required to select the best possible options, considering cost/benefit ratio. We designed a time-step simulation framework representing the evolution of post-contingency failures and load/system restoration. System unserved energy is translated into economic losses. Different enhancement options can be compared in terms of benefit (reduction in the cost of unserved energy) and of cost (investments needed) to eventually rank them. The simulation framework also provides a way to derive an optimal lost load recovering strat...
Electrical grids have been developed over a century, which are considered as one of the most importa...
The work reported in this dissertation aims at developing a practical tool for utility transmission ...
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from ...
© 2016 IEEE. The impact of coordinated malicious attacks may be dramatically severe and may yield a ...
The impact of coordinated malicious attacks may be dramatically severe and may yield a wide area bla...
Security of power systems, as a critical infrastructure, is a global concern because continuous, rel...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical...
For economic reasons, modern power systems are commonly operated close to their secure limits so tha...
The power system protection against different threats has become a key and growing concern. A mate- ...
Energy grids and critical infrastructures in general undergo drastic changes. Specifically, energy ...
Electricity plays a vital role in the economy. The consumption of electricity has expon...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
Power systems are exposed to various physical threats due to extreme events, technical failures, hum...
The dependence of modern societies on electric energy is ever increasing by the emergence of smart c...
The purpose of this thesis is to identify the vulnerabilities of the power system to ensure its robu...
Electrical grids have been developed over a century, which are considered as one of the most importa...
The work reported in this dissertation aims at developing a practical tool for utility transmission ...
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from ...
© 2016 IEEE. The impact of coordinated malicious attacks may be dramatically severe and may yield a ...
The impact of coordinated malicious attacks may be dramatically severe and may yield a wide area bla...
Security of power systems, as a critical infrastructure, is a global concern because continuous, rel...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical...
For economic reasons, modern power systems are commonly operated close to their secure limits so tha...
The power system protection against different threats has become a key and growing concern. A mate- ...
Energy grids and critical infrastructures in general undergo drastic changes. Specifically, energy ...
Electricity plays a vital role in the economy. The consumption of electricity has expon...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
Power systems are exposed to various physical threats due to extreme events, technical failures, hum...
The dependence of modern societies on electric energy is ever increasing by the emergence of smart c...
The purpose of this thesis is to identify the vulnerabilities of the power system to ensure its robu...
Electrical grids have been developed over a century, which are considered as one of the most importa...
The work reported in this dissertation aims at developing a practical tool for utility transmission ...
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from ...