Research Article

Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective

Figure 2

Under (a), (d), and (g) complete-defense mode, (b), (e), and (h) partial-defense mode, and (c), (f) and (i) no-defense mode, both sides benefit when the hackers launch different attack strategies.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)