Research Article

Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective

Figure 8

Under (a) complete-defense of host, (b) partial-defense of host, and (c) no-defense of host, both sides benefit when the hackers launch different attack strategies; under (d) complete-defense of host, (e) partial-defense of host, and (f) no-defense of host, both sides benefit when the hackers launch different attack strategies; under (g) complete-defense of network, (h) partial-defense of network, and (i) no-defense of network, both sides benefit when the hackers launch different attack strategies.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)