Research Article

Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective

Figure 3

Under (a) Complete-defense of host and network, (b) complete-defense of host and partial-defense of network, (c) complete-defense of host and no-defense of network, (d) partial-defense of host and complete-defense of network, (e) partial-defense of host and network, (f) partial-defense of host and no-defense of network, (g) no-defense of host and complete-defense of network, (h) no-defense of host and partial-defense of network, and (i) no-defense of host and network, both sides benefit when the hackers launch different attack strategies.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)