Fig. 8From: A review of cyber security risks of power systems: from static to dynamic false data attacksIllustrative diagram of consensus-based control of inverter i under FDI attacksBack to article page