Research Article
Cascading Failure Model for Command and Control Networks Based on an m-Order Adjacency Matrix
Figure 6
The comparison graph of cascading invulnerability with different limits. (a) . (b) . (c) . (d) . (e) . (f) .
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |