Fig. 3From: Coordinated cyber-physical attack considering false overload of linesMembership distribution graph of the objective functionBack to article page