Fig. 5From: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?Device-Centric Edge Security for VPPBack to article page