{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:33:45Z","timestamp":1760060025192,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Instituci\u00f3n Universitaria Pascual Bravo, Proyecto de Investigaci\u00f3n \u201cRegulaci\u00f3n de frecuencia el\u00e9ctrica empleando resortes el\u00e9ctricos en sistemas con alta penetraci\u00f3n de energ\u00edas renovables\u201d","award":["PCT00036"],"award-info":[{"award-number":["PCT00036"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Power system infrastructure is exposed to a range of threats, including both naturally occurring events and intentional attacks. Traditional vulnerability assessment models, typically based on the N-1 criterion, do not account for the intentionality of disruptive agents. This paper presents a game-theoretic approach to protecting power system infrastructure against deliberate attacks, taking into account the effects of demand response. The interaction between the disruptive agent and the system operator is modeled as a leader\u2013follower Stackelberg game. The leader, positioned in the upper-level optimization problem, must decide which elements to render out of service, anticipating the reaction of the follower (the system operator), who occupies the lower-level problem. The Stackelberg game is reformulated as a bilevel optimization model and solved using a metaheuristic approach. To evaluate the applicability of the proposed method, a 24-bus test system was employed. The results demonstrate that integrating demand response significantly enhances system resilience, compelling the disruptive agent to adopt alternative attack strategies that lead to lower overall disruption. The proposed model serves as a valuable decision-support tool for system operators and planners seeking to improve the robustness and security of electrical networks against disruptive agents.<\/jats:p>","DOI":"10.3390\/computers14080308","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:00:41Z","timestamp":1753884041000},"page":"308","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2369-6173","authenticated-orcid":false,"given":"Jes\u00fas M.","family":"L\u00f3pez-Lezama","sequence":"first","affiliation":[{"name":"Grupo en Manejo Eficiente de la Energ\u00eda (GIMEL), Departamento de Ingenier\u00eda El\u00e9ctrica, Universidad de Antioquia (UdeA), Calle 70 No. 52-21, Medell\u00edn 050010, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1407-5559","authenticated-orcid":false,"given":"Nicol\u00e1s","family":"Mu\u00f1oz-Galeano","sequence":"additional","affiliation":[{"name":"Grupo en Manejo Eficiente de la Energ\u00eda (GIMEL), Departamento de Ingenier\u00eda El\u00e9ctrica, Universidad de Antioquia (UdeA), Calle 70 No. 52-21, Medell\u00edn 050010, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9134-8576","authenticated-orcid":false,"given":"Sergio D.","family":"Saldarriaga-Zuluaga","sequence":"additional","affiliation":[{"name":"Departamento de El\u00e9ctrica, Facultad de Ingenier\u00eda, Instituci\u00f3n Universitaria Pascual Bravo, Calle 73 No. 73A-226, Medell\u00edn 050036, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3589-3008","authenticated-orcid":false,"given":"Santiago","family":"Bustamante-Mesa","sequence":"additional","affiliation":[{"name":"Departamento de El\u00e9ctrica, Facultad de Ingenier\u00eda, Instituci\u00f3n Universitaria Pascual Bravo, Calle 73 No. 73A-226, Medell\u00edn 050036, Colombia"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"ref_1","unstructured":"Corsi, S., and Sabelli, C. (2004, January 6\u201310). General blackout in Italy Sunday September 28, 2003, h. 03:28:00. Proceedings of the IEEE Power Engineering Society General Meeting, Denver, CO, USA."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ruiz, C.A., Orrego, N.J., and Gutierrez, J.F. (2008, January 13\u201315). The Colombian 2007 black out. Proceedings of the 2008 IEEE\/PES Transmission and Distribution Conference and Exposition: Latin America, Bogota, Colombia.","DOI":"10.1109\/TDC-LA.2008.4641845"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1109\/TPWRS.2022.3169482","article-title":"Revealing Vulnerability of N-1 Secure Power Systems to Coordinated Cyber-Physical Attacks","volume":"38","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/TR.2023.3294264","article-title":"Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks","volume":"73","author":"Kong","year":"2024","journal-title":"IEEE Trans. Reliab."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"179970","DOI":"10.1109\/ACCESS.2020.3028222","article-title":"Power System Security With Cyber-Physical Power System Operation","volume":"8","author":"Oyewole","year":"2020","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Iqbal, A., Honhaga, I., Teffera, E., Perry, A., Baker, R., Pearce, G., and Szabo, C. (2024). Vulnerability and Defence: A Case for Stackelberg Game Dynamics. Games, 15.","DOI":"10.3390\/g15050032"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TPWRS.2004.825888","article-title":"Analysis of electric grid security under terrorist threat","volume":"19","author":"Salmeron","year":"2004","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_8","unstructured":"Salmer\u00f3n, J., Wood, K., and Baldick, R. (2004). Optimizing Electric Grid Design Under Asymmetric Threat (II), Naval Postgraduate School. Technical Report NPS-OR-04-001."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TPWRS.2005.846198","article-title":"On the solution of the bilevel programming formulation of the terrorist threat problem","volume":"20","author":"Arroyo","year":"2005","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TPWRS.2005.851942","article-title":"A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat","volume":"20","author":"Motto","year":"2005","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1049\/iet-gtd.2009.0098","article-title":"Bilevel programming applied to power system vulnerability analysis under multiple contingencies","volume":"4","author":"Arroyo","year":"2010","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/TPWRS.2011.2159138","article-title":"Investment Planning for Electric Power Systems Under Terrorist Threat","volume":"27","author":"Romero","year":"2012","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2984","DOI":"10.1109\/TPWRS.2016.2628887","article-title":"An Efficient Tri-Level Optimization Model for Electric Grid Defense Planning","volume":"32","author":"Wu","year":"2017","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.cor.2013.06.009","article-title":"A trilevel programming approach for electric grid defense planning","volume":"41","author":"Alguacil","year":"2014","journal-title":"Comput. Oper. Res."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1016\/j.apenergy.2017.06.059","article-title":"Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding","volume":"210","author":"Lin","year":"2018","journal-title":"Appl. Energy"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1049\/iet-gtd.2018.6104","article-title":"Tri-level transmission expansion planning under intentional attacks: Virtual attacker approach\u2014Part I: Formulation","volume":"13","author":"Nemati","year":"2019","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/TPWRS.2012.2226480","article-title":"Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation","volume":"28","author":"Ma","year":"2013","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"113008","DOI":"10.1109\/ACCESS.2024.3443061","article-title":"Power System Stability Analysis From Cyber Attacks Perspective","volume":"12","author":"Semertzis","year":"2024","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"477","DOI":"10.35833\/MPCE.2018.000830","article-title":"Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks","volume":"9","author":"Ni","year":"2021","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4323","DOI":"10.1109\/TCSI.2019.2922371","article-title":"Cascading Failure of Cyber-Coupled Power Systems Considering Interactions Between Attack and Defense","volume":"66","author":"Liu","year":"2019","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"84","DOI":"10.23919\/PCMP.2023.000476","article-title":"A Defense Planning Model for a Power System Against Coordinated Cyber-Physical Attack","volume":"9","author":"Li","year":"2024","journal-title":"Prot. Control Mod. Power Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/TR.2022.3199095","article-title":"Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions","volume":"72","author":"Rao","year":"2023","journal-title":"IEEE Trans. Reliab."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"18147","DOI":"10.1109\/ACCESS.2024.3361039","article-title":"A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security","volume":"12","author":"Tatipatri","year":"2024","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"78","DOI":"10.15446\/dyna.v82n192.48578","article-title":"Vulnerability assessment of power systems to intentional attacks using a specialized genetic algorithm","volume":"82","author":"Agudelo","year":"2015","journal-title":"Dyna"},{"key":"ref_25","first-page":"181","article-title":"A Cuckoo Search Algorithm Applied to the Electric Grid Interdiction Problem","volume":"13","year":"2018","journal-title":"WSEAS Trans. Power Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/JSYST.2023.3342846","article-title":"Incentive-Based Demand Response Program for Blockchain Network","volume":"18","author":"Yaghmaee","year":"2024","journal-title":"IEEE Syst. J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1109\/TSG.2018.2822729","article-title":"A Low Complexity and Secure Demand Response Technique for Peak Load Reduction","volume":"10","author":"Parizy","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TCNS.2016.2622362","article-title":"Optimal Power Flow With Inelastic Demands for Demand Response in Radial Distribution Networks","volume":"5","author":"Khonji","year":"2018","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1049\/iet-gtd.2013.0815","article-title":"Distribution network reliability improvements in presence of demand response","volume":"8","author":"Safdarian","year":"2014","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_30","unstructured":"Lakshminarayana, S., Maple, C., Larkins, A., Flack, D., Few, C., David, K.A., and Srivastava, A.K. (2023). Cybersecurity Threats to Power Grid Operations from the Demand-Side Response Ecosystem. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Tuo, M., Ramesh, A.V., and Li, X. (2020). Benefits and Cyber-Vulnerability of Demand Response System in Real-Time Grid Operations. arXiv.","DOI":"10.1109\/SmartGridComm47815.2020.9302964"},{"key":"ref_32","first-page":"120936","article-title":"Data-driven Distributionally Robust Scheduling of Community Integrated Energy Systems Considering Demand Response and Renewable Uncertainty","volume":"341","author":"Li","year":"2023","journal-title":"Appl. Energy"},{"key":"ref_33","unstructured":"Ming, P., Xiao, J., and Fang, J. (2017). Scenario-Based Economic Dispatch Considering Demand Response Uncertainty. Energies, 10."},{"key":"ref_34","first-page":"251","article-title":"Vulnerabilities and countermeasures-A survey on the cyber security issues in the transmission subsystem of a smart grid","volume":"1","author":"Deng","year":"2012","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mojica-Nava, E., and Ruiz, F. (2021). Stackelberg Population Dynamics: A Predictive-Sensitivity Approach. Games, 12.","DOI":"10.3390\/g12040088"},{"key":"ref_36","unstructured":"Pardalos, P., Birge, J.R., Du, D.Z., Floudas, C.A., Mockus, J., Sherali, H.D., and Stavroulakis, G. (1994). Nonconvex Optimization and Its Applications, Springer. [1st ed.]."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ijepes.2011.10.032","article-title":"Location and contract pricing of distributed generation using a genetic algorithm","volume":"36","author":"Contreras","year":"2012","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TPWRS.2010.2051168","article-title":"MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education","volume":"26","author":"Zimmerman","year":"2011","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.23919\/JSEE.2021.000103","article-title":"An iterated local coordinate-exchange algorithm for constructing experimental designs for multi-dimensional constrained spaces","volume":"32","author":"Yang","year":"2021","journal-title":"J. Syst. Eng. Electron."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/TCBB.2015.2474400","article-title":"A GRASP-Based Heuristic for the Sorting by Length-Weighted Inversions Problem","volume":"15","author":"Dias","year":"2018","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/308\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:19:03Z","timestamp":1760033943000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"references-count":40,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["computers14080308"],"URL":"https:\/\/doi.org\/10.3390\/computers14080308","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2025,7,30]]}}}