Cyber Security of Critical Infrastructures Recent Publications Attacks on time synchronization: the delay box, undetectable attacks on state estimation with PMUs, Feasibility of Time Synchronization Attacks against PMU-based State-Estimation