In-depth security analyses of power systems (PSs) require to consider the vulnerabilities to natural and human-related threats, which may cause multiple dependent contingencies. On the other hand, such events often lead to high impact on the system, so that decision-making aimed to enhance security may become difficult. Introducing the uncertainty, the risk associated to each contingency can be evaluated, thus allowing to perform effective contingency ranking. This paper describes an in-depth security assessment methodology, based on an ``extended'' definition of risk (including threats, vulnerability, contingency, and impact) aimed to perform the risk assessment of the integrated power and Information and Communication Technology (ICT) systems. The results of the application to test cases and realistic PSs show the added value of the proposed approach with respect to conventional security analyses in dealing with uncertainty of threats, vulnerabilities, and system response.
Probabilistic Risk-Based Security Assessment of Power Systems Considering Incumbent Threats and Uncertainties
MASSUCCO, STEFANO;
2016-01-01
Abstract
In-depth security analyses of power systems (PSs) require to consider the vulnerabilities to natural and human-related threats, which may cause multiple dependent contingencies. On the other hand, such events often lead to high impact on the system, so that decision-making aimed to enhance security may become difficult. Introducing the uncertainty, the risk associated to each contingency can be evaluated, thus allowing to perform effective contingency ranking. This paper describes an in-depth security assessment methodology, based on an ``extended'' definition of risk (including threats, vulnerability, contingency, and impact) aimed to perform the risk assessment of the integrated power and Information and Communication Technology (ICT) systems. The results of the application to test cases and realistic PSs show the added value of the proposed approach with respect to conventional security analyses in dealing with uncertainty of threats, vulnerabilities, and system response.File | Dimensione | Formato | |
---|---|---|---|
07432051.pdf
accesso chiuso
Tipologia:
Documento in versione editoriale
Dimensione
2.56 MB
Formato
Adobe PDF
|
2.56 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.