The document discusses false data-injection attacks on power systems and the challenges they pose to state estimation based on meter measurements. It outlines the development of optimal attack strategies and proposes both protection-based and detection-based defenses to mitigate such threats. The proposed defenses include spatial and temporal detection algorithms, with experiments proving their effectiveness in identifying compromised meters and enhancing system resilience.