Journal ArticleDOI
Evaluation of the Most Harmful Malicious Attacks in Power Systems Based on a New Set of Centralities
TLDR
An evaluation of targeted attack sequences based on a new set of power traffic centrality measures according to the vulnerability prediction measure (VPM) approach finds the RMCEF strategy with degree, eigenvector and Katz centralities is a good estimation of the most harmful attack sequences on nodes and links with a shorter execution time than the IMDEF.Abstract:
This paper aims to present an evaluation of targeted attack sequences based on a new set of power traffic centrality measures according to the vulnerability prediction measure (VPM) approach. A framework for evaluation of attack proposed in previous work is applied using three fault strategies: remove most central element first (RMCEF), iterated most central element first, and iterated electrical most damaging element first (IMDEF). For attacks on nodes, the reliability of the IMDEF strategy is confirmed, as it was the most predictive in terms of the VPM. Nevertheless, in attacks performed on links, the IMDEF does not always represents the most harmful attack. Regarding the new centralities, the Katz centrality consistently presented high values of VPM for attacks on nodes and links, with results that are comparable to degree and eigenvector centralities. In terms of execution times, the percolation centrality is not recommended, as it presented the highest execution times. The RMCEF strategy with degree, eigenvector and Katz centralities is a good estimation of the most harmful attack sequences on nodes and links with a shorter execution time than the IMDEF.read more
Citations
More filters
Proceedings Article
A Perspective overview of topological approaches for vulnerability analysis of power transmission grids
TL;DR: In this article, an extended topological approach which incorporates electrical features such as flow path, line flow limits, etc. is presented and three new metrics, netability, electrical betweenness and entropy degree are provided and used to assess structural vulnerability in power transmission grids.
References
More filters
Journal ArticleDOI
A new status index derived from sociometric analysis.
TL;DR: A new method of computation which takes into account who chooses as well as how many choose is presented, which introduces the concept of attenuation in influence transmitted through intermediaries.
Journal ArticleDOI
Cyber-security on smart grid: Threats and potential solutions
TL;DR: The threats and potential solutions of the IoT-based smart grid are analyzed and a deep understanding of cyber-security vulnerabilities and solutions are supply and a guide on future research directions for cyber- security in smart grid applications is given.
Journal ArticleDOI
Ancient dispersal of the human fungal pathogen Cryptococcus gattii from the Amazon rainforest
Ferry Hagen,Paulo Cezar Ceresini,Itzhack Polacheck,Hansong Ma,Filip Van Nieuwerburgh,Toni Gabaldón,Sarah Kagan,E. Rhiannon Pursall,Hans L. Hoogveld,Leo van Iersel,Gunnar W. Klau,Steven Kelk,Leen Stougie,Leen Stougie,Karen H. Bartlett,Kerstin Voelz,Leszek P. Pryszcz,Elizabeth Castañeda,Márcia dos Santos Lazéra,Wieland Meyer,Dieter Deforce,Jacques F. Meis,Robin C. May,Corné H. W. Klaassen,Teun Boekhout,Teun Boekhout +25 more
TL;DR: This work used phylogenetic and recombination analyses, based on AFLP and multiple MLST datasets, and coalescence gene genealogy to demonstrate that these outbreaks have arisen from a highly-recombining C. gattii called AFLP6/VGII, but the origin of the outbreak clades remains enigmatic.
Journal ArticleDOI
Percolation Centrality: Quantifying Graph-Theoretic Impact of Nodes during Percolation in Networks
TL;DR: A new measure is proposed that quantifies relative impact of nodes based on their topological connectivity, as well as their percolation states, that can be extended to include random walk based definitions and its computational complexity is shown to be of the same order as that of betweenness centrality.
Journal ArticleDOI
Recognition and Vulnerability Analysis of Key Nodes in Power Grid Based on Complex Network Centrality
TL;DR: Simulation results of IEEE 30-bus and IEEE 57-bus test cases show that the key nodes can be effectively identified with high electrical centrality and resultant cascading failures that eventually lead to a severe decrease in net-ability, verifying the correctness and effectiveness of the analysis.