Fig. 6From: Load balancing of renewable energy: a cyber security analysisHigh level overview of the analysis resultsBack to article page