Fig. 5From: A review of cyber security risks of power systems: from static to dynamic false data attacksA power system decomposed into attack and attack-free regionsBack to article page