Research Article
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors
Figure 7
Under three attack strategies, the number of remaining nodes (axis ) is after attacking nodes (axis ). (a) is an image with equal to 0.2. (b) is an image with equal to 0.4. (c) is an image with equal to 0.6. (d) is an image with equal to 0.8.
(a) |
(b) |
(c) |
(d) |