Fig. 10From: Coordinated cyber-physical attack considering false overload of linesLoad reduction distribution by attacking different linesBack to article page