Power Grid Reliability Evaluation Considering Wind Farm Cyber Security and Ramping Events
Round 1
Reviewer 1 Report
Section 1: the percentage from reference [1] is actually ~11%.
Figure 1: is wrongly numbered as figure 2
Figure 2: looks nearly identical to the original in reference [22] (figure 8). Be very clear on whose work it is.
Table 2: The abbreviations 'PS' and 'PM' are not explained
Section 4.2: References are needed for material annealing at the specified temperature, and to support the claim that excessive load and overheating are the most frequent reasons for premature fatigue of wind turbines.
Section 5.2: It appears that the available energy in the wind based on a windspeed profile was not considered in the constraints of the DCOPF problem ( equation (19)-(26)). This constraint would have an impact on the results shown in section 6.1.
Figure 6: It would be clearer to read if the penetration levels are shown in the legend.
Reference [31]: The link does not work. Please provide a working link or an alternative reference.
Author Response
Thanks for reviewing the manuscript and the suggestions!
We have uploaded our point-by-point response to the comments, please see the attachment.
Author Response File: Author Response.docx
Reviewer 2 Report
In equation (1), does the time T mean the duration of the attack or the mean duration between two attacks? Is it time per year? Please clarify.
In equation (2) and (3), do you have actual history data of attack and defense? If yes, why not use the actual data to generate the CDF curve?
If the distributions of attack and defense are different from equation (2) and (3), is the method still valid?
The reviewer is still confuse with the definition of worst case in chapter 4.1. Does it mean the attack is longer than the defense and cause load shedding? Is it possible the the attack succeeds but no load shedding happens?
In equation (5), should Pgen represent actual generation output, instead of generation capacity?
Author Response
Thanks for reviewing the manuscript and the suggestions!
We have uploaded our point-by-point response to the comments, please see the attachment.
Author Response File: Author Response.docx