Fig. 4From: Empirical framework for identification of the most harmful malicious attacks on a smart gridProposed iterated EMD centralityBack to article page