Research Article
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective
Figure 2
Under (a), (d), and (g) complete-defense mode, (b), (e), and (h) partial-defense mode, and (c), (f) and (i) no-defense mode, both sides benefit when the hackers launch different attack strategies.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |