Fig. 11From: Empirical framework for identification of the most harmful malicious attacks on a smart gridComparing the running time versus number of elements removedBack to article page