Research Article
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors
Figure 5
Under -shell attack, the figure shows how many nodes failed in the network (color shades) at time (axis ) when nodes were attacked (axis ), where the range of is 5 to 200, with an interval of 5 nodes. (a) is an image with equal to 0.2. (b) is an image with equal to 0.4. (c) is an image with equal to 0.6. (d) is an image with equal to 0.8.
(a) |
(b) |
(c) |
(d) |