Fig. 3From: Load balancing of renewable energy: a cyber security analysisDataflow #50 as modelled in securiCADBack to article page