Fig. 3From: On specification-based cyber-attack detection in smart gridsIllustration of the rule generation process to automatically generate the SB based on the infrastructure modelBack to article page