<?xml version="1.0" encoding="UTF-8"?><rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcq="http://purl.org/dc/terms/"><records count="1" morepages="false" start="1" end="1"><record rownumber="1"><dc:product_type>Conference Paper</dc:product_type><dc:title>SEQUIN: A Network Science and Physics-based Approach to Identify Sequential N-k Attacks in Electric Power Grids</dc:title><dc:creator>Chio, Andrew (ORCID:0000000189202749); Bent, Russell (ORCID:000000027300151X); Sundar, Kaarthik (ORCID:000000026928449X); Venkatasubramanian, Nalini (ORCID:0000000170112268)</dc:creator><dc:corporate_author/><dc:editor/><dc:description>Not Available</dc:description><dc:publisher>ACM
The electric grid is a vital infrastructure that supplies power on which modern society depends, and maintaining its reliable service and resilient operation is essential. The grid's performance typically relies on a few key components. However, efficiently finding these components is challenging, due to the geo-distributed scale of the grid, complex physics governing power flows, and automated network response. Realistically identifying these key components must also consider the temporal aspect of how failures affect the network. In this paper, we address the problem of identifying worst-case disruptions to the grid, under the sequential failure of components. We present SEQUIN, a framework leveraging network science principles and physics-based constraint optimization to explore such failures in the grid. We formulate the problem using a sequential N-k interdiction model, which provides a methodology to explore and capture interactions between the failures and network response. Our approach defines several network properties to assess the contribution of each component towards its operation, and provides an efficient guided exploration of attacks. We also provide a toolkit to help reason about the impact on the grid. Extensive experiments on multiple benchmark grid networks are conducted to show the efficacy of our approach and demonstrate how the varying the sequence of attacks can result in different levels of disruption.</dc:publisher><dc:date>2025-05-06</dc:date><dc:nsf_par_id>10677223</dc:nsf_par_id><dc:journal_name/><dc:journal_volume/><dc:journal_issue/><dc:page_range_or_elocation>1 to 12</dc:page_range_or_elocation><dc:issn/><dc:isbn>9798400714986</dc:isbn><dc:doi>https://doi.org/10.1145/3716550.3722029</dc:doi><dcq:identifierAwardId>2420846</dcq:identifierAwardId><dc:subject/><dc:version_number/><dc:location/><dc:rights/><dc:institution/><dc:sponsoring_org>National Science Foundation</dc:sponsoring_org></record></records></rdf:RDF>