| In China,with the rapid and high-quality development of the economy,the scale of the electric power system has gradually expanded,and various new technologies and mechanisms have been put into use,leading to the increasing difficulty in maintaining the reliable operation of the system and the increasingly stringent requirements for the power supply.The safety of the electric power system is not only related to people’s lives and economic development,but also closely related to social security.Natural disasters and deliberate attacks pose a serious threat to the safe and stable operation of the power system,and are also widely concerned by various countries.Therefore,it is particularly important to analyze the vulnerability of power systems.To address the two problems that existing vulnerability studies ignore the characteristics of threats and attackers’ subjective preferences and the lack of accuracy for vulnerability identification,this paper proposes a vulnerability identification method for power systems that considers the subjective preferences of deliberate attacks:(1)Considering the impact of equipment destruction in plants and stations on the functional damage and repair time of plants and stations,the reliability correlation relationship between equipment,and the geographical aggregation characteristics of equipment,sub-module destruction consequences and plant and station deactivation fault sets are established.(2)Considering the target deactivation area and expected restoration time,a twostage optimization identification model for key plant stations and submodules of the power system is established.Further,the KKT conditional method is used for the first stage and the nonlinear constraints are linearized using the Big M method to transform the problem into a single-level mixed-integer linear model,which is solved using the solver.(3)The arithmetic simulation of the IEEE-39 node system verifies the reasonableness of the model,and the accurate weak regions obtained are important to support the defender in making defense decisions under different scenarios and improve the rationality and scientificity of the defense strategy.Compared with the traditional power system vulnerability identification method that does not consider the attacker’s preference,the power system vulnerability identification method that considers the subjective preference of deliberate attacks proposed in this paper provides accurate identification of power system vulnerability points,which is a reference for defenders to operate the power system safely and reliably under deliberate attacks. |