Table 3 MATRIX \(F^{\left( 6\right) }\).

From: Adaptive residual observer-based detection and isolation framework against false data injection attack in large-scale power systems

 

\(\left( 1\right)\)

\(\left( 2\right)\)

\(\left( 3\right)\)

\(\left( 1,2\right)\)

\(\left( 1,3\right)\)

\(\left( 2,3\right)\)

\(\left( 1,2,3\right)\)

\(\left( 1\right)\)

1

0

0

1

1

0

1

\(\left( 2\right)\)

0

1

0

1

0

1

1

\(\left( 1,2\right)\)

1

1

0

1

1

1

1

\(\left( 1,3\right)\)

1

0

1

1

1

1

1

\(\left( 2,3\right)\)

0

1

1

1

1

1

1

\(\left( 1,2,3\right)\)

1

1

1

1

1

1

1