The optimal false data injection attacks based on zonotopes | IEEE Conference Publication | IEEE Xplore