Fig. 8From: Coordinated cyber-physical attack considering false overload of linesNumber of overloaded lines under different attack resourcesBack to article page