Fig. 9From: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?Edge-Based Privacy-Preserving ModelBack to article page