Research Article

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors

Figure 3

Under attack, the figure shows how many nodes failed in the network (color shades) at time (axis ) when nodes were attacked (axis ), where the range of p is 5 to 200, with an interval of 5 nodes. (a) is an image with equal to 0.2. (b) is an image with equal to 0.4. (c) is an image with equal to 0.6. (d) is an image with equal to 0.8.
(a)
(b)
(c)
(d)