Skip to main content

Advertisement

Table 3 A chain of stochastic security games

From: Risk mitigation in electric power systems: Where to start?

Game G\({SP}_{\mathcal {A}}\)\({SP}_{\mathcal {D}}\)\(\delta ^{*}_{k}=nashEq(G)\)\(bestAction(\delta ^{*}_{k})\)
G1{a1,a2,a3}{d1,d2,d3,d4,d5,d6,d7,d8}(0,0,0,0,0,0,0,1)d8T
G2{a1,a2,a3}{d1,d2,d3,d4,d5,d6,d7}(0,0,0,0.375,0,0.625,0)d6S4
G3{a1,a2,a3}{d1,d2,d3,d4,d5,d7}(0,1,0,0,0,0)d2S1
G4{a1,a2,a3}{d1,d3,d4,d5,d7}(0.6,0,0,0,0.4)d1R1
G5{a1,a2,a3}{d3,d4,d5,d7}(0,0,0,1)d7S5
G6{a1,a2,a3}{d3,d4,d5}(1,0,0)d4S3
G7{a1,a2,a3}{d3,d5}(0,1)d5R2