Fig. 9From: A novel hybrid cybersecurity scheme against false data injection attacks in automated power systemsSV subscriber a voltage waveform after the attack b current waveform after the attackBack to article page