Fig. 2From: Load balancing of renewable energy: a cyber security analysisDataflow #30 as modelled in securiCADBack to article page