Fig. 7From: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?Edge Based Intrusion Detection System (EIDS)Back to article page