Identifying vulnerabilities of state estimators against cyber-attacks | IEEE Conference Publication | IEEE Xplore