Fig. 5From: Load balancing of renewable energy: a cyber security analysisSCADA centralized authentication as modelled in securiCADBack to article page