Research Article

Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System

Figure 2

Example of a monitoring system.