Fig. 6From: Coordinated cyber-physical attack considering false overload of linesOperating cost under false overload conditionsBack to article page