Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems | IEEE Journals & Magazine | IEEE Xplore