Research Article

[Retracted] Electricity Network Security Monitoring Based on Bee Colony Algorithm

Figure 4

CPU running time of various algorithms under different scale attacks.