{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T14:07:29Z","timestamp":1774015649093,"version":"3.50.1"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71671074"],"award-info":[{"award-number":["71671074"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51208223"],"award-info":[{"award-number":["51208223"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572212"],"award-info":[{"award-number":["61572212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71301085"],"award-info":[{"award-number":["71301085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2014QN166"],"award-info":[{"award-number":["2014QN166"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering &amp; System Safety"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1016\/j.ress.2017.03.031","type":"journal-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:20:44Z","timestamp":1490296844000},"page":"144-154","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":58,"special_numbering":"C","title":["Mitigating electric power system vulnerability to worst-case spatially localized attacks"],"prefix":"10.1016","volume":"165","author":[{"given":"Min","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Min","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shitong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.ress.2017.03.031_bib1","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1111\/j.1539-6924.2010.01528.x","article-title":"On some recent definitions and analysis frameworks for risk, vulnerability and resilience","volume":"31","author":"Aven","year":"2011","journal-title":"Risk Anal"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib2","doi-asserted-by":"crossref","first-page":"04014025","DOI":"10.1061\/(ASCE)IS.1943-555X.0000212","article-title":"Measuring the performance of transportation infrastructure systems in disasters: a comprehensive review","volume":"21","author":"Faturechi","year":"2015","journal-title":"J Infrastruct Syst"},{"issue":"6","key":"10.1016\/j.ress.2017.03.031_bib3","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.66.065102","article-title":"Cascade-based attacks on complex networks","volume":"66","author":"Motter","year":"2002","journal-title":"Phys Rev E"},{"issue":"4","key":"10.1016\/j.ress.2017.03.031_bib4","doi-asserted-by":"crossref","first-page":"045104","DOI":"10.1103\/PhysRevE.69.045104","article-title":"Model for cascading failures in complex networks","volume":"69","author":"Crucitti","year":"2004","journal-title":"Phys Rev E"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib5","doi-asserted-by":"crossref","first-page":"025103","DOI":"10.1103\/PhysRevE.69.025103","article-title":"Structural vulnerability of the North American power grid","volume":"69","author":"Albert","year":"2004","journal-title":"Phys Rev E"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib6","doi-asserted-by":"crossref","first-page":"026103","DOI":"10.1063\/1.2737822","article-title":"Complex systems analysis of series of blackouts: cascading failure, critical points and self-organization","volume":"17","author":"Dobson","year":"2007","journal-title":"Chaos"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib7","doi-asserted-by":"crossref","first-page":"033122","DOI":"10.1063\/1.4737204","article-title":"Time-dependent resilience assessment and improvement of urban infrastructure systems","volume":"22","author":"Ouyang","year":"2012","journal-title":"Chaos"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib8","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1063\/1.1781391","article-title":"Complex dynamics of blackouts in power transmission systems","volume":"14","author":"Carreras","year":"2004","journal-title":"Chaos"},{"key":"10.1016\/j.ress.2017.03.031_bib9","doi-asserted-by":"crossref","unstructured":"Dobson I, Carreras BA, Newman DE. A branching process approximation to cascading load-dependent system failure. In: Proceedings of the thirty-seventh Hawaii international conference on system sciences. Hawaii, Jan; 2004.","DOI":"10.1109\/HICSS.2004.1265185"},{"issue":"9","key":"10.1016\/j.ress.2017.03.031_bib10","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1109\/TCSII.2008.924365","article-title":"Using transmission line outage data to estimate cascading failure propagation in an electric power system","volume":"55","author":"Ren","year":"2008","journal-title":"IEEE Trans Circuits Syst-II: Express Brief"},{"key":"10.1016\/j.ress.2017.03.031_bib11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.strusafe.2011.12.004","article-title":"A three-stage resilience analysis framework for urban infrastructure systems","volume":"36\u201337","author":"Ouyang","year":"2012","journal-title":"Structural Saf"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib12","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1002\/eqe.626","article-title":"Seismic response of critical interdependent networks","volume":"36","author":"Due\u00f1as-Osorio","year":"2007","journal-title":"Earthq Eng Struct Dyn"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib13","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.ress.2006.10.014","article-title":"Serviceability of earthquake-damaged water systems: effects of electrical power availability and power backup systems on system vulnerability","volume":"93","author":"Adachi","year":"2008","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib14","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1002\/eqe.1118","article-title":"Seismic risk assessment of interdependent critical infrastructure systems: the case of European gas and electricity networks","volume":"41","author":"Poljansek","year":"2012","journal-title":"Earthq Eng Struct Dyn"},{"key":"10.1016\/j.ress.2017.03.031_bib15","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.strusafe.2014.01.001","article-title":"Multi-dimensional hurricane resilience assessment of electric power systems","volume":"48","author":"Ouyang","year":"2014","journal-title":"Struct Saf"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib16","doi-asserted-by":"crossref","first-page":"033122","DOI":"10.1063\/1.3489887","article-title":"Do topological models provide good information about electricity infrastructure vulnerability?","volume":"20","author":"Hines","year":"2010","journal-title":"Chaos"},{"issue":"4","key":"10.1016\/j.ress.2017.03.031_bib17","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1111\/j.1539-6924.2006.00791.x","article-title":"Using graph models to analyze the vulnerability of electric power networks","volume":"26","author":"Holmgren","year":"2006","journal-title":"Risk Anal"},{"issue":"7","key":"10.1016\/j.ress.2017.03.031_bib18","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1142\/S0218127407018531","article-title":"\u201cTopological vulnerability of the European power grid under errors and attacks","volume":"17","author":"Rosas-Casals","year":"2007","journal-title":"Int J Bifurc Chaos"},{"issue":"5","key":"10.1016\/j.ress.2017.03.031_bib19","doi-asserted-by":"crossref","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","article-title":"Attack vulnerability of complex networks","volume":"65","author":"Holme","year":"2002","journal-title":"Phys Rev E"},{"key":"10.1016\/j.ress.2017.03.031_bib20","first-page":"52","article-title":"The concept of betweenness in the analysis of power grid vulnerability","volume":"5","author":"Bompard","year":"2010","journal-title":"Complex Eng"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib21","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TPWRS.2004.825888","article-title":"Analysis of electric grid security under terrorist threat","volume":"19","author":"Salmeron","year":"2004","journal-title":"IEEE Trans Power Syst"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib22","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TPWRS.2008.2004825","article-title":"Worst-case interdiction analysis of large-scale electric power grids","volume":"24","author":"Salmeron","year":"2009","journal-title":"IEEE Trans Power Syst"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib23","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TPWRS.2005.851942","article-title":"A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat","volume":"20","author":"Motto","year":"2005","journal-title":"IEEE Trans Power Syst"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib24","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TPWRS.2005.846198","article-title":"On the solution of the bilevel programming formulation of the terrorist threat problem","volume":"20","author":"Arroyo","year":"2005","journal-title":"IEEE Trans Power Syst"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib25","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TPWRS.2006.889080","article-title":"Evaluating strategies for defending electric power networks against antagonistic attacks","volume":"22","author":"Holmgren","year":"2007","journal-title":"IEEE Trans Power Syst"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib26","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TPWRS.2010.2078524","article-title":"Exploring reliable strategies for defending power systems against targeted attacks","volume":"26","author":"Chen","year":"2011","journal-title":"IEEE Trans Power Syst"},{"issue":"8934","key":"10.1016\/j.ress.2017.03.031_bib27","article-title":"Localized attacks on spatially embedded networks with dependencies","volume":"5","author":"Berezin","year":"2015","journal-title":"Sci Rep"},{"key":"10.1016\/j.ress.2017.03.031_bib28","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.ress.2015.08.014","article-title":"Flow-based vulnerability measures for network component importance: experimentation with preparedness planning","volume":"145","author":"Nicholson","year":"2016","journal-title":"Reliab Eng Syst Saf"},{"issue":"9","key":"10.1016\/j.ress.2017.03.031_bib29","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1016\/j.ress.2006.08.004","article-title":"Identification of critical locations across multiple infrastructures for terrorist actions","volume":"92","author":"Patterson","year":"2007","journal-title":"Reliab Eng Syst Saf"},{"issue":"12","key":"10.1016\/j.ress.2017.03.031_bib30","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1016\/j.ress.2010.06.010","article-title":"An approach for modeling interdependent infrastructures in the context of vulnerability analysis","volume":"95","author":"Johansson","year":"2010","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2017.03.031_bib31","doi-asserted-by":"crossref","DOI":"10.1111\/risa.12708","article-title":"Critical infrastructure vulnerability to spatially localized failures with applications to Chinese railway system","author":"Ouyang","year":"2017","journal-title":"Risk Anal"},{"key":"10.1016\/j.ress.2017.03.031_bib32","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.ress.2016.05.007","article-title":"Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks","volume":"154","author":"Ouyang","year":"2016","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib33","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1111\/risa.12333","article-title":"Operational models of infrastructure resilience","volume":"35","author":"Alderson","year":"2015","journal-title":"Risk Anal"},{"key":"10.1016\/j.ress.2017.03.031_bib34","article-title":"Assessing and improving operational resilience of critical infrastructures and other systems","author":"Alderson","year":"2014","journal-title":"Tutor Oper Res Inf"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib35","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1109\/TPWRS.2013.2256374","article-title":"Vulnerability analysis of power grids with line switching","volume":"28","author":"Zhao","year":"2013","journal-title":"IEEE Trans Power Syst"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib36","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TPWRS.2008.922256","article-title":"Optimal transmission switching","volume":"23","author":"Fisher","year":"2008","journal-title":"IEEE Trans Power Syst"},{"issue":"3","key":"10.1016\/j.ress.2017.03.031_bib37","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1109\/TPWRS.2009.2020530","article-title":"Optimal transmission switching with contingency analysis","volume":"24","author":"Hedman","year":"2009","journal-title":"IEEE Trans Power Syst"},{"issue":"9","key":"10.1016\/j.ress.2017.03.031_bib38","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1016\/j.ress.2006.08.007","article-title":"Methodology for identifying near-optimal interdiction strategies for a power transmission system","volume":"92","author":"Bier","year":"2007","journal-title":"Reliab Eng Syst Saf"},{"issue":"4","key":"10.1016\/j.ress.2017.03.031_bib39","doi-asserted-by":"crossref","first-page":"355","DOI":"10.23940\/ijpe.12.4.p355.mag","article-title":"Review of systems defense and attack models","volume":"8","author":"Hausken","year":"2012","journal-title":"Int J Perform Eng"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib40","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.ress.2008.06.005","article-title":"Minmax defense strategy for complex multi-state systems","volume":"94","author":"Hausken","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"issue":"4","key":"10.1016\/j.ress.2017.03.031_bib41","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1142\/S021759591100317X","article-title":"Active and passive defense against multiple attack facilities","volume":"28","author":"Levitin","year":"2011","journal-title":"Asia-Pac J Oper Res"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib42","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1016\/j.ejor.2016.06.033","article-title":"Defense and attack for interdependent systems","volume":"256","author":"Hausken","year":"2016","journal-title":"Eur J Oper Res"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib43","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/00207720903434789","article-title":"Protecting complex infrastructures against multiple strategic attackers","volume":"42","author":"Hausken","year":"2011","journal-title":"Int J Syst Sci"},{"key":"10.1016\/j.ress.2017.03.031_bib44","series-title":"Power generation, operation and control","author":"Wood","year":"1996"},{"issue":"2","key":"10.1016\/j.ress.2017.03.031_bib45","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/TPWRS.2003.811168","article-title":"Classification of publications and models on transmission expansion planning","volume":"18","author":"Latorre","year":"2003","journal-title":"Power Syst, IEEE Trans"},{"key":"10.1016\/j.ress.2017.03.031_bib46","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.ress.2016.10.028","article-title":"Optimizing power system investments and resilience against attacks","volume":"159","author":"Fang","year":"2017","journal-title":"Reliab Eng Syst Saf"},{"issue":"11","key":"10.1016\/j.ress.2017.03.031_bib47","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1016\/j.ress.2009.05.011","article-title":"Meeting a demand vs. enhancing protections in homogeneous parallel systems","volume":"94","author":"Levitin","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib48","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.ejor.2011.03.035","article-title":"Trade-offs between target hardening and overarching protection","volume":"213","author":"Haphuriwat","year":"2011","journal-title":"Eur J Oper Res"},{"issue":"7","key":"10.1016\/j.ress.2017.03.031_bib49","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1057\/jors.2011.96","article-title":"Individual vs. overarching protection against strategic attacks","volume":"63","author":"Levitin","year":"2012","journal-title":"J Oper Res Soc"},{"key":"10.1016\/j.ress.2017.03.031_bib50","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ress.2013.05.024","article-title":"Individual vs. overarching protection for minimizing the expected damage caused by an attack","volume":"119","author":"Levitin","year":"2013","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2017.03.031_bib51","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10100-012-0271-6","article-title":"Individual vs overarching protection and attack of assets","volume":"22","author":"Hausken","year":"2014","journal-title":"Cent Eur J Oper Res"},{"key":"10.1016\/j.ress.2017.03.031_bib52","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.ress.2013.11.001","article-title":"Optimal defense with variable number of overarching and individual protections","volume":"123","author":"Levitin","year":"2014","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2017.03.031_bib53","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.ress.2014.12.013","article-title":"Vulnerability assessment and mitigation for the Chinese railway system under floods","volume":"137","author":"Hong","year":"2015","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2017.03.031_bib54","doi-asserted-by":"crossref","DOI":"10.1111\/mice.12252","article-title":"A mathematical framework to optimize critical infrastructure resilience against intentional attacks","author":"Ouyang","year":"2017","journal-title":"Comput.-aided Civ. Infrastruct. Eng."},{"key":"10.1016\/j.ress.2017.03.031_bib55","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","article-title":"Review on modeling and simulation of interdependent critical infrastructure systems","volume":"121","author":"Ouyang","year":"2014","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2017.03.031_bib56","first-page":"81","article-title":"A leader-follower game on congestion management in power systems","author":"Salehizadeh","year":"2015"}],"container-title":["Reliability Engineering &amp; System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832016309498?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832016309498?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T05:56:25Z","timestamp":1719122185000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832016309498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":56,"alternative-id":["S0951832016309498"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2017.03.031","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2017,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mitigating electric power system vulnerability to worst-case spatially localized attacks","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2017.03.031","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}