Fig. 1From: A review of cyber security risks of power systems: from static to dynamic false data attacksCyber-attacks on a power systemBack to article page