Fig. 3From: Empirical framework for identification of the most harmful malicious attacks on a smart gridLogarithm of degree centrality with basis on ICM (red) and MCE (black)Back to article page