Fig. 10From: Empirical framework for identification of the most harmful malicious attacks on a smart gridApproaches in order increasing complexityBack to article page