%PDF-1.4
%
1 0 obj
<< /S /GoTo /D (section.1) >>
endobj
4 0 obj
(Introduction)
endobj
5 0 obj
<< /S /GoTo /D (section.2) >>
endobj
8 0 obj
(Simplified Optimal Power Flow)
endobj
9 0 obj
<< /S /GoTo /D (subsection.2.1) >>
endobj
12 0 obj
(Optimal Solution)
endobj
13 0 obj
<< /S /GoTo /D (subsection.2.2) >>
endobj
16 0 obj
(Nominal Optimal Operation)
endobj
17 0 obj
<< /S /GoTo /D (section.3) >>
endobj
20 0 obj
(Simplified OPF under a Data Attack)
endobj
21 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
24 0 obj
(Consequences on the DC-OPF solution)
endobj
25 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
28 0 obj
(Consequences on the physical network)
endobj
29 0 obj
<< /S /GoTo /D (section.4) >>
endobj
32 0 obj
(Analytical Example)
endobj
33 0 obj
<< /S /GoTo /D (subsubsection.4.0.1) >>
endobj
36 0 obj
(Scenario 1: \(c22c12\))
endobj
37 0 obj
<< /S /GoTo /D (subsubsection.4.0.2) >>
endobj
40 0 obj
(Scenario 2: \(c22c12\))
endobj
41 0 obj
<< /S /GoTo /D (section.5) >>
endobj
44 0 obj
(Impact-Aware Security Index)
endobj
45 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
48 0 obj
(Connections to Problem 1)
endobj
49 0 obj
<< /S /GoTo /D (section.6) >>
endobj
52 0 obj
(Conclusions and Future Work)
endobj
53 0 obj
<< /S /GoTo /D (section*.2) >>
endobj
56 0 obj
(References)
endobj
57 0 obj
<< /S /GoTo /D (section*.3) >>
endobj
60 0 obj
(Appendix: Enforcing Assumption 2)
endobj
61 0 obj
<< /S /GoTo /D [62 0 R /Fit ] >>
endobj
87 0 obj <<
/Length 4285
/Filter /FlateDecode
>>
stream
xڍZIwƱ_݃a[Ekűw-,@ *>UU Jtt]U=\MoV?yç~HUUS3Z~Aߜz_40_ v^^?4_^7POw4uiu~|?^QfQZ,xt)ļWs8˱u֡Y cڭLl^ qӇsKX},nh~<)%uɒgdNxC2YA|tE-I㧢W>ݮhk1yhyD|Aqt^qڧc~ʪ:M'$Oqq|xj/a,J ^0/ G<7K:uSNfl/Q;c'M%߯SV}iS