Fig. 8From: Load balancing of renewable energy: a cyber security analysisAggregated attack graph of an attacker positioned at the software vendorBack to article page