Credible Interdiction for Transmission Systems

نویسندگان

چکیده

This paper presents novel formulations and algorithms for $N$-$k$ interdiction problem in transmission networks. In particular, it formulates spatial topological resource constraints on attackers problems illustrates the formulation with two new classes of attacks: (i) Spatial attacks where attack is constrained by geographic distance a bus chosen an attacker (ii) Topological to connected components. These specific types compute plans designed better model localized attacks, such as those induced natural disasters or physical attacks. We then formulate these resource-constrained bilevel, max-min optimization present constraint generation algorithm solve formulations. Detailed case studies analyzing behavior spatially topologically comparing them traditional are also presented.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

channel estimation for mimo-ofdm systems

تخمین دقیق مشخصات کانال در سیستم های مخابراتی یک امر مهم محسوب می گردد. این امر به ویژه در کانال های بیسیم با ‏خاصیت فرکانس گزینی و زمان گزینی شدید، چالش بزرگی است. مقالات متعدد پر از روش های مبتکرانه ای برای طراحی و آنالیز ‏الگوریتم های تخمین کانال است که بیشتر آنها از روش های خاصی استفاده می کنند که یا دارای عملکرد خوب با پیچیدگی ‏محاسباتی بالا هستند و یا با عملکرد نه چندان خوب پیچیدگی پایینی...

Credible Reputation Systems for P2P e-Communities

Reputation mechanisms for distributed e-Communities are vital tools for facilitating trust decisions regarding transactions between entities. Motivated by the current challenges in the area of P2P reputation systems regarding their desgign, credibilty enhancement and objective evaluation, in this thesis we worked towards (1) creating a framework for the development and evaluation of secure repu...

متن کامل

High Resolution Detection Systems for Interdiction of Nuclear Material Trafficking

The interdiction of nuclear materials during illegal transportation requires both detection of radiation and identification of radionuclides in order to distinguish among the various categories of nuclides and their implied threat. Interdiction regimes, based upon available technologies, were developed rapidly after the tragic events of 9-11. In general, a low resolution or "no-resolution" port...

متن کامل

Methodology for identifying near-optimal interdiction strategies for a power transmission system

Previous methods for assessing the vulnerability of complex systems to intentional attacks or interdiction have either not been adequate to deal with systems in which flow readjusts dynamically (such as electricity transmission systems), or have been complex and computationally difficult. We propose a relatively simple, inexpensive, and practical method (‘‘Max Line’’) for identifying promising ...

متن کامل

Symmetric Interdiction for Matching Problems

Motivated by denial-of-service network attacks, we introduce the symmetric interdiction model, where both the interdictor and the optimizer are subject to the same constraints of the underlying optimization problem. We give a general framework that relates optimization to symmetric interdiction for a broad class of optimization problems. We then study the symmetric matching interdiction problem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Control of Network Systems

سال: 2021

ISSN: ['2325-5870', '2372-2533']

DOI: https://doi.org/10.1109/tcns.2021.3050128