Research Article

An Effective Node-To-Edge Interdependent Network and Vulnerability Analysis for Digital Coupled Power Grids

Figure 4

Cascading process with virtual nodes added to cyber node failure.
(a)
(b)
(c)