Figure 5

Severe attack patterns in the N-stable UCTE network. (a) Size of the surviving giant component G as a function of the total load of targeted nodes. The data points on the continuous lines represent the sizes of the total load of the targeted nodes; the lines show the sizes of G when targeting those nodes. Their color codes identify the used attack pattern: the four-highest-load-node removal (purple), the 4 nodes that removed together cause the highest damage, nodes selected by our greedy algorithm (green), the 4 nodes causing the highest damage when individually removed (blue). (b) Comparison of the size of damage caused by various attack patterns by ranking G in nondecreasing order. The figures contain 300 simulations for each attack scenario on the N-stable UCTE network with α = 0.5927. (c) Visualization on the UCTE network of the nodes used in the different attack patterns for triggering the cascading failures.