Research Article

Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective

Figure 4

Under (a) complete-defense of host and management, (b) complete-defense of host and partial-defense of management, (c) complete-defense of host and no-defense of management, (d) partial-defense of host and complete-defense of management, (e) partial-defense of host and management, (f) partial-defense of host and no-defense of management, (g) no-defense of host and complete-defense of management, (h) no-defense of host and partial-defense of management, and (i) no-defense of host and management, both sides benefit when the hackers launch different attack strategies.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)