Fig. 1From: Coordinated cyber-physical attack considering false overload of linesDiagram of coordinated cyber-physical attacksBack to article page