Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation | IEEE Journals & Magazine | IEEE Xplore