Data injection attacks using a hardware Trojan on a transmission line | IEEE Conference Publication | IEEE Xplore