Fig. 4From: Load balancing of renewable energy: a cyber security analysisSCADA zone as modelled in securiCADBack to article page