“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18]) C10. SG failures fault status detection [41], [46], [61], [62], [126], [127], [142], [176], fault type classification [197], power distribution reliability [149], [195] As it can be seen, there is large variability in the aspects covered by the research.…”