Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Jul 15, 2020 · This paper proposes a new graph theoretic approach for analyzing whether a contingency will create a saturated cut-set in a meshed power network ...
Feb 19, 2021 · This paper proposes a new graph theoretic ap- proach for analyzing whether a contingency will create a saturated cut-set in a meshed power ...
Sep 8, 2024 · This research designs three metrics to assess system vulnerability, and analyzes their characteristics over different system structures. A ...
This paper proposes a new graph theoretic approach for analyzing whether a contingency will create a saturated cut-set in a meshed power network. A novel ...
A graph-theoretical model of multienzyme networks is described. Formal operations on the graph permit identification of the important paths for information flow ...
In these works, authors characterize system theoretic properties of descriptor systems, including control- lability, observability, and fault detectability. The ...
The TVA approach draws on a database of known exploits and system vulnerabilities to provide a con- nected graph representing possible cyber-attack paths within ...
People also ask
Feb 14, 2023 · A method based on graph deep learning is proposed for grid vulnerable nodes identification to realize fast and accurate identification of vulnerable nodes.
First, we propose the use of graph theoretic techniques to study structural properties of power networks modeled via linear continuous-time descriptor systems.
The graph-based method can reveal cascades propagation, and provides an effective way to visualize and analyze the system vulnerability.