Skip to main content

Table 3 A chain of stochastic security games

From: Risk mitigation in electric power systems: Where to start?

Game G

\({SP}_{\mathcal {A}}\)

\({SP}_{\mathcal {D}}\)

\(\delta ^{*}_{k}=nashEq(G)\)

\(bestAction(\delta ^{*}_{k})\)

G1

{a1,a2,a3}

{d1,d2,d3,d4,d5,d6,d7,d8}

(0,0,0,0,0,0,0,1)

d8−T

G2

{a1,a2,a3}

{d1,d2,d3,d4,d5,d6,d7}

(0,0,0,0.375,0,0.625,0)

d6−S4

G3

{a1,a2,a3}

{d1,d2,d3,d4,d5,d7}

(0,1,0,0,0,0)

d2−S1

G4

{a1,a2,a3}

{d1,d3,d4,d5,d7}

(0.6,0,0,0,0.4)

d1−R1

G5

{a1,a2,a3}

{d3,d4,d5,d7}

(0,0,0,1)

d7−S5

G6

{a1,a2,a3}

{d3,d4,d5}

(1,0,0)

d4−S3

G7

{a1,a2,a3}

{d3,d5}

(0,1)

d5−R2