Can Attackers With Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems? | IEEE Journals & Magazine | IEEE Xplore