An Efficient Grid Data Access with StoRM

2011 ◽  
pp. 239-250 ◽  
Author(s):  
Riccardo Zappi ◽  
Elisabetta Ronchieri ◽  
Alberto Forti ◽  
Antonia Ghiselli
Keyword(s):  
2008 ◽  
Vol 119 (7) ◽  
pp. 072019 ◽  
Author(s):  
P Jakl ◽  
J Lauret ◽  
A Hanushevsky ◽  
A Shoshani ◽  
A Sim ◽  
...  
Keyword(s):  

2012 ◽  
Vol 396 (3) ◽  
pp. 032027 ◽  
Author(s):  
Traian Cristian Cirstea ◽  
Jan Just Keijser ◽  
Oscar Arthur Koeroo ◽  
Ronald Starink ◽  
Jeffrey Alan Templon
Keyword(s):  

Author(s):  
Wenti Yang ◽  
Zhitao Guan ◽  
Longfei Wu ◽  
Xiaojiang Du ◽  
Mohsen Guizani

Energies ◽  
2019 ◽  
Vol 12 (3) ◽  
pp. 342 ◽  
Author(s):  
Peng Jiang ◽  
Shengjun Huang ◽  
Tao Zhang

As a critical infrastructure, the modern electrical network is faced with various types of threats, such as accidental natural disaster attacks and deliberate artificial attacks, thus the power system fortification has attracted great concerns in the community of academic, industry, and military. Nevertheless, the attacker is commonly assumed to be capable of accessing all information in the literature (e.g., network configuration and defensive plan are explicitly provided to the attacker), which might always be the truth since the grid data access permission is usually restricted. In this paper, the information asymmetry between defender and attacker is investigated, leading to an optimal deception strategy problem for power system fortification. Both the proposed deception and traditional protection strategies are formulated as a tri-level mixed-integer linear programming (MILP) problem and solved via two-stage robust optimization (RO) framework and the column-and-constraint generation (CCG) algorithm. Comprehensive case studies on the 6-bus system and IEEE 57-bus system are implemented to reveal the difference between these two strategies and identify the significance of information deception. Numerical results indicate that deception strategy is superior to protection strategy. In addition, detailed discussions on the performance evaluation and convergence analysis are presented as well.


2020 ◽  
Vol 36 (4) ◽  
pp. 1773-1784
Author(s):  
Lihua Zhang ◽  
Jingjing Li ◽  
Fangzhou Hu ◽  
Yang Huang ◽  
Jiayi Bai

2009 ◽  
Vol 2 (1-2) ◽  
pp. 117-131 ◽  
Author(s):  
W. J. Som de Cerff ◽  
M. Petitdidier ◽  
A. Gemünd ◽  
L. Horstink ◽  
H. Schwichtenberg

Sign in / Sign up

Export Citation Format

Share Document