Fig. 9From: Empirical framework for identification of the most harmful malicious attacks on a smart gridExplanation of the ASM application between two fault sequencesBack to article page