Research Article
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors
Figure 3
Under attack, the figure shows how many nodes failed in the network (color shades) at time (axis ) when nodes were attacked (axis ), where the range of p is 5 to 200, with an interval of 5 nodes. (a) is an image with equal to 0.2. (b) is an image with equal to 0.4. (c) is an image with equal to 0.6. (d) is an image with equal to 0.8.
| (a) |
| (b) |
| (c) |
| (d) |