Research Article
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective
Figure 4
Under (a) complete-defense of host and management, (b) complete-defense of host and partial-defense of management, (c) complete-defense of host and no-defense of management, (d) partial-defense of host and complete-defense of management, (e) partial-defense of host and management, (f) partial-defense of host and no-defense of management, (g) no-defense of host and complete-defense of management, (h) no-defense of host and partial-defense of management, and (i) no-defense of host and management, both sides benefit when the hackers launch different attack strategies.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |