Fig. 6From: A review of cyber security risks of power systems: from static to dynamic false data attacksA path connecting two neighboring busesBack to article page