Credible Interdiction for Transmission Systems
نویسندگان
چکیده
This paper presents novel formulations and algorithms for $N$-$k$ interdiction problem in transmission networks. In particular, it formulates spatial topological resource constraints on attackers problems illustrates the formulation with two new classes of attacks: (i) Spatial attacks where attack is constrained by geographic distance a bus chosen an attacker (ii) Topological to connected components. These specific types compute plans designed better model localized attacks, such as those induced natural disasters or physical attacks. We then formulate these resource-constrained bilevel, max-min optimization present constraint generation algorithm solve formulations. Detailed case studies analyzing behavior spatially topologically comparing them traditional are also presented.
منابع مشابه
channel estimation for mimo-ofdm systems
تخمین دقیق مشخصات کانال در سیستم های مخابراتی یک امر مهم محسوب می گردد. این امر به ویژه در کانال های بیسیم با خاصیت فرکانس گزینی و زمان گزینی شدید، چالش بزرگی است. مقالات متعدد پر از روش های مبتکرانه ای برای طراحی و آنالیز الگوریتم های تخمین کانال است که بیشتر آنها از روش های خاصی استفاده می کنند که یا دارای عملکرد خوب با پیچیدگی محاسباتی بالا هستند و یا با عملکرد نه چندان خوب پیچیدگی پایینی...
Credible Reputation Systems for P2P e-Communities
Reputation mechanisms for distributed e-Communities are vital tools for facilitating trust decisions regarding transactions between entities. Motivated by the current challenges in the area of P2P reputation systems regarding their desgign, credibilty enhancement and objective evaluation, in this thesis we worked towards (1) creating a framework for the development and evaluation of secure repu...
متن کاملHigh Resolution Detection Systems for Interdiction of Nuclear Material Trafficking
The interdiction of nuclear materials during illegal transportation requires both detection of radiation and identification of radionuclides in order to distinguish among the various categories of nuclides and their implied threat. Interdiction regimes, based upon available technologies, were developed rapidly after the tragic events of 9-11. In general, a low resolution or "no-resolution" port...
متن کاملMethodology for identifying near-optimal interdiction strategies for a power transmission system
Previous methods for assessing the vulnerability of complex systems to intentional attacks or interdiction have either not been adequate to deal with systems in which flow readjusts dynamically (such as electricity transmission systems), or have been complex and computationally difficult. We propose a relatively simple, inexpensive, and practical method (‘‘Max Line’’) for identifying promising ...
متن کاملSymmetric Interdiction for Matching Problems
Motivated by denial-of-service network attacks, we introduce the symmetric interdiction model, where both the interdictor and the optimizer are subject to the same constraints of the underlying optimization problem. We give a general framework that relates optimization to symmetric interdiction for a broad class of optimization problems. We then study the symmetric matching interdiction problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Control of Network Systems
سال: 2021
ISSN: ['2325-5870', '2372-2533']
DOI: https://doi.org/10.1109/tcns.2021.3050128