Research Article
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective
Figure 8
Under (a) complete-defense of host, (b) partial-defense of host, and (c) no-defense of host, both sides benefit when the hackers launch different attack strategies; under (d) complete-defense of host, (e) partial-defense of host, and (f) no-defense of host, both sides benefit when the hackers launch different attack strategies; under (g) complete-defense of network, (h) partial-defense of network, and (i) no-defense of network, both sides benefit when the hackers launch different attack strategies.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |