Research Article

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors

Figure 8

Under three attack strategies, the persistent time of cascade (axis ) is after attacking nodes (axis ). (a) is an image with equal to 0.2. (b) is an image with equal to 0.4. (c) is an image with equal to 0.6. (d) is an image with equal to 0.8.
(a)
(b)
(c)
(d)