no code implementations • 31 Jan 2023 • Saptarshi Ghosh, Murali Sankar Venkatraman, Shehab Ahmed, Charalambos Konstantinou
In the second level, the attacker observes the placement of the PMUs and compromises them, with the aim of maximizing the state estimation error and reducing the observability of the network.