Review of static risk-based security assessment in power system

Power systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this critical area, as presented here, shows that the security assessment has transformed from a deterministi...

Full description

Bibliographic Details
Main Authors: Md Zakirul Alam Bhuiyan, George J. Anders, Jason Philhower, Songhuai Du
Format: Article
Language:English
Published: Wiley 2019-01-01
Series:IET Cyber-Physical Systems
Subjects:
Online Access:https://digital-library.theiet.org/content/journals/10.1049/iet-cps.2018.5080
id doaj-bf5eeb73e5f34e669b0b111f27e0e986
record_format Article
spelling doaj-bf5eeb73e5f34e669b0b111f27e0e9862021-04-02T13:25:28ZengWileyIET Cyber-Physical Systems2398-33962019-01-0110.1049/iet-cps.2018.5080IET-CPS.2018.5080Review of static risk-based security assessment in power systemMd Zakirul Alam Bhuiyan0George J. Anders1Jason Philhower2Jason Philhower3Songhuai Du4Fordham UniversityTechnical University of LodzUniversity of ConnecticutUniversity of ConnecticutChina Agricultural UniversityPower systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this critical area, as presented here, shows that the security assessment has transformed from a deterministic to risk-based methods, with two broad categories, risk assessment and risk identification. First, a detailed discussion of risk assessment is given to summarise different methods to solve the problems of equipment failure probability model, scenarios formation, and severity assessment. Further, comprehensive survey and prospect for risk identification are provided as a roadmap to determine the risk source directly. Risk identification techniques such as tracking method, sensitivity analysis, and risk source identification help operators to take effectively preventive action and restore system security.https://digital-library.theiet.org/content/journals/10.1049/iet-cps.2018.5080power system securityrisk managementsensitivity analysisprobabilityrisk analysisdecision makingsecurity of datapower systemunavoidable faultsfailuresimportant challengesignificant research worksrisk assessmentequipment failure probability modelseverity assessmentrisk identification techniquesrisk source identification help operatorssystem securitystatic risk-based security assessment
collection DOAJ
language English
format Article
sources DOAJ
author Md Zakirul Alam Bhuiyan
George J. Anders
Jason Philhower
Jason Philhower
Songhuai Du
spellingShingle Md Zakirul Alam Bhuiyan
George J. Anders
Jason Philhower
Jason Philhower
Songhuai Du
Review of static risk-based security assessment in power system
IET Cyber-Physical Systems
power system security
risk management
sensitivity analysis
probability
risk analysis
decision making
security of data
power system
unavoidable faults
failures
important challenge
significant research works
risk assessment
equipment failure probability model
severity assessment
risk identification techniques
risk source identification help operators
system security
static risk-based security assessment
author_facet Md Zakirul Alam Bhuiyan
George J. Anders
Jason Philhower
Jason Philhower
Songhuai Du
author_sort Md Zakirul Alam Bhuiyan
title Review of static risk-based security assessment in power system
title_short Review of static risk-based security assessment in power system
title_full Review of static risk-based security assessment in power system
title_fullStr Review of static risk-based security assessment in power system
title_full_unstemmed Review of static risk-based security assessment in power system
title_sort review of static risk-based security assessment in power system
publisher Wiley
series IET Cyber-Physical Systems
issn 2398-3396
publishDate 2019-01-01
description Power systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this critical area, as presented here, shows that the security assessment has transformed from a deterministic to risk-based methods, with two broad categories, risk assessment and risk identification. First, a detailed discussion of risk assessment is given to summarise different methods to solve the problems of equipment failure probability model, scenarios formation, and severity assessment. Further, comprehensive survey and prospect for risk identification are provided as a roadmap to determine the risk source directly. Risk identification techniques such as tracking method, sensitivity analysis, and risk source identification help operators to take effectively preventive action and restore system security.
topic power system security
risk management
sensitivity analysis
probability
risk analysis
decision making
security of data
power system
unavoidable faults
failures
important challenge
significant research works
risk assessment
equipment failure probability model
severity assessment
risk identification techniques
risk source identification help operators
system security
static risk-based security assessment
url https://digital-library.theiet.org/content/journals/10.1049/iet-cps.2018.5080
work_keys_str_mv AT mdzakirulalambhuiyan reviewofstaticriskbasedsecurityassessmentinpowersystem
AT georgejanders reviewofstaticriskbasedsecurityassessmentinpowersystem
AT jasonphilhower reviewofstaticriskbasedsecurityassessmentinpowersystem
AT jasonphilhower reviewofstaticriskbasedsecurityassessmentinpowersystem
AT songhuaidu reviewofstaticriskbasedsecurityassessmentinpowersystem
_version_ 1721565176631656448