“…Of those engineering works that consider intentional attacks, optimal power flow techniques are popular for identifying sets of power system components to attack [81]- [83]. Likewise, metaheuristic formulations to identify promising attack targets are also common [37], [38], [40], [79], [84]- [88]. Finally, and as previously mentioned, network structural metrics are also used within the power systems literature on attack simulation [33], [46], [47], [54], [55], [89]- [91].…”