From: Empirical framework for identification of the most harmful malicious attacks on a smart grid
 | IEEE 300 Bus |  |  | IEEE 118 Bus |  |
---|---|---|---|---|---|
Deg. | Eig. | Bet. | Deg. | Eig. | Bet. |
109 | 3 | 78 | 9 | 9 | 77 |
3 | 167 | 81 | 49 | 5 | 68 |
116 | 109 | 31 | 5 | 38 | 19 |
98 | 98 | 86 | 89 | 49 | 12 |
210 | 112 | 38 | 69 | 89 | 15 |
36 | 170 | 54 | 38 | 30 | 49 |
167 | 36 | 36 | 30 | 69 | 30 |
170 | 210 | 109 | 30 | 64 | 37 |
20 | 144 | 190 | 25 | 25 | 100 |
2 | 160 | 198 | 59 | 59 | 23 |
160 | 20 | 194 | 64 | 68 | 96 |
\(\cdots\) | \(\cdots\) | \(\cdots\) | \(\cdots\) | \(\cdots\) | \(\cdots\) |