Review of static risk-based security assessment in power system
Power systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this critical area, as presented here, shows that the security assessment has transformed from a deterministi...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-01-01
|
Series: | IET Cyber-Physical Systems |
Subjects: | |
Online Access: | https://digital-library.theiet.org/content/journals/10.1049/iet-cps.2018.5080 |
id |
doaj-bf5eeb73e5f34e669b0b111f27e0e986 |
---|---|
record_format |
Article |
spelling |
doaj-bf5eeb73e5f34e669b0b111f27e0e9862021-04-02T13:25:28ZengWileyIET Cyber-Physical Systems2398-33962019-01-0110.1049/iet-cps.2018.5080IET-CPS.2018.5080Review of static risk-based security assessment in power systemMd Zakirul Alam Bhuiyan0George J. Anders1Jason Philhower2Jason Philhower3Songhuai Du4Fordham UniversityTechnical University of LodzUniversity of ConnecticutUniversity of ConnecticutChina Agricultural UniversityPower systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this critical area, as presented here, shows that the security assessment has transformed from a deterministic to risk-based methods, with two broad categories, risk assessment and risk identification. First, a detailed discussion of risk assessment is given to summarise different methods to solve the problems of equipment failure probability model, scenarios formation, and severity assessment. Further, comprehensive survey and prospect for risk identification are provided as a roadmap to determine the risk source directly. Risk identification techniques such as tracking method, sensitivity analysis, and risk source identification help operators to take effectively preventive action and restore system security.https://digital-library.theiet.org/content/journals/10.1049/iet-cps.2018.5080power system securityrisk managementsensitivity analysisprobabilityrisk analysisdecision makingsecurity of datapower systemunavoidable faultsfailuresimportant challengesignificant research worksrisk assessmentequipment failure probability modelseverity assessmentrisk identification techniquesrisk source identification help operatorssystem securitystatic risk-based security assessment |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Md Zakirul Alam Bhuiyan George J. Anders Jason Philhower Jason Philhower Songhuai Du |
spellingShingle |
Md Zakirul Alam Bhuiyan George J. Anders Jason Philhower Jason Philhower Songhuai Du Review of static risk-based security assessment in power system IET Cyber-Physical Systems power system security risk management sensitivity analysis probability risk analysis decision making security of data power system unavoidable faults failures important challenge significant research works risk assessment equipment failure probability model severity assessment risk identification techniques risk source identification help operators system security static risk-based security assessment |
author_facet |
Md Zakirul Alam Bhuiyan George J. Anders Jason Philhower Jason Philhower Songhuai Du |
author_sort |
Md Zakirul Alam Bhuiyan |
title |
Review of static risk-based security assessment in power system |
title_short |
Review of static risk-based security assessment in power system |
title_full |
Review of static risk-based security assessment in power system |
title_fullStr |
Review of static risk-based security assessment in power system |
title_full_unstemmed |
Review of static risk-based security assessment in power system |
title_sort |
review of static risk-based security assessment in power system |
publisher |
Wiley |
series |
IET Cyber-Physical Systems |
issn |
2398-3396 |
publishDate |
2019-01-01 |
description |
Power systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this critical area, as presented here, shows that the security assessment has transformed from a deterministic to risk-based methods, with two broad categories, risk assessment and risk identification. First, a detailed discussion of risk assessment is given to summarise different methods to solve the problems of equipment failure probability model, scenarios formation, and severity assessment. Further, comprehensive survey and prospect for risk identification are provided as a roadmap to determine the risk source directly. Risk identification techniques such as tracking method, sensitivity analysis, and risk source identification help operators to take effectively preventive action and restore system security. |
topic |
power system security risk management sensitivity analysis probability risk analysis decision making security of data power system unavoidable faults failures important challenge significant research works risk assessment equipment failure probability model severity assessment risk identification techniques risk source identification help operators system security static risk-based security assessment |
url |
https://digital-library.theiet.org/content/journals/10.1049/iet-cps.2018.5080 |
work_keys_str_mv |
AT mdzakirulalambhuiyan reviewofstaticriskbasedsecurityassessmentinpowersystem AT georgejanders reviewofstaticriskbasedsecurityassessmentinpowersystem AT jasonphilhower reviewofstaticriskbasedsecurityassessmentinpowersystem AT jasonphilhower reviewofstaticriskbasedsecurityassessmentinpowersystem AT songhuaidu reviewofstaticriskbasedsecurityassessmentinpowersystem |
_version_ |
1721565176631656448 |