Fig. 3From: Risk mitigation in electric power systems: Where to start?Three compromise graphs corresponding to the identified attack strategies a1,a2,and a3Back to article page