Fig. 2From: Coordinated cyber-physical attack considering false overload of linesFlowchart of false overload target line selectionBack to article page