Skip to main content


Table 3 Analysis results with an attacker positioned at the Software/Hardware Vendor

From: Load balancing of renewable energy: a cyber security analysis

Variants 1st & 2nd RTUs DER RTU SCADA servers
Model variant A (no DMZ / less secure) 16 days 18 days 13 days
Model variant B (no DMZ / more secure) 21 days 22 days 15 days
Model variant C (DMZ / less secure) 57 days 60 days 53 days
Model variant D (DMZ / more secure) 87 days 85 days 73 days