“…In state 7, the control center will make decisions and send control commands after receiving physical system information, except for the breaker information of branch (8,9) at time T + 3. Those commands include reclosing the breaks of branch (5,7), branch (4,5), and branch (6,9), which are First turning into state 1 in Figure 7, the system operates normally, as shown in Figure 2, at time T. Assuming that an FDI attack occurs on the downlink between the control center and the cyber node connected to branch (5,7), which is represented by G f t down (7, 5) = G f t down (5, 7) = 0, state 1 enters into state 2. In state 2, the breaker of the branch (5,7) trips at time T + 1 by reason of the FDI attack, which leads to the power flow on each branch being redistributed.…”