Fig. 7From: Load balancing of renewable energy: a cyber security analysisAggregated attack graph of an attacker positioned on the internetBack to article page