Fig. 8From: Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networksScalability performance on different systemsBack to article page