Visible to the public Biblio

Filters: Author is Guo, Q.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Guo, Q., Fan, J., Li, N..  2015.  The achieve of power manager application honey-pot based on sandbox. 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT). :2523–2527.

Honeypot is a common method of attack capture, can maximize the reduction of cyber-attacks. However, its limited application layer simulation makes it impossible to use effectively in power system. Through research on sandboxing technology, this article implements the simulated power manager applications by packaging real power manager applications, in order to expand the honeypot applied range.

V
Shu, H., Shen, X., Xu, L., Guo, Q., Sun, H..  2018.  A Validity Test Methodfor Transmission Betweens and Transmission Sections Based on Chain Attack Analysisand Line Outage Distribution Factors. 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2). :1-6.

The identification of transmission sections is used to improve the efficiency of monitoring the operation of the power grid. In order to test the validity of transmission sections identified, an assessment process is necessary. In addition, Transmission betweenness, an index for finding the key transmission lines in the power grid, should also be verified. In this paper, chain attack is assumed to check the weak links in the grid, thus verifying the transmission betweenness implemented for the system. Moreover, the line outage distribution factors (LODFs) are used to quantify the change of power flow when the leading line in transmission sections breaks down, so that the validity of transmission sections can be proved. Case studies based on IEEE 39 and IEEE 118 -bus system proved the effectiveness of the proposed method.