Fig. 5From: Coordinated cyber-physical attack considering false overload of linesLine power flow accounts for the proportion of capacity during normal operationBack to article page