A Methodology to Extract Rules to Identify Attacks in Power System Critical Infrastructure | IEEE Conference Publication | IEEE Xplore