Improving a methodology to extract rules to identify attacks in power system critical infrastructure: New results | IEEE Conference Publication | IEEE Xplore