Fig. 4From: A review of cyber security risks of power systems: from static to dynamic false data attacksA boundary bus in the attacking regionBack to article page