Fig. 10From: Load balancing of renewable energy: a cyber security analysisAggregated attack graph of an attacker positioned at the energy supplierBack to article page