I. Introduction
With the massive adoptions of advanced information and communication technology (ICT), the power system control center usually features sophisticated communication, computation, and control functionalities [1]. Although the networked control system is efficient and convenient, it also incorporates more network intrusion risks, which would deteriorate the security and stable operation of the physical network by tampering with device information or sending wrong instructions [2]–[4]. For instance, many regions of Venezuela, including the capital Caracas, suffered power outages for more than 24 hours in March 2019, which caused a massive traffic jam and public facility collapse, e.g., hospitals, schools, etc. Therefore, the cyberattack has emerged as a critical concern for power systems [5].