Fig. 7From: A review of cyber security risks of power systems: from static to dynamic false data attacksIllustrative diagram of distributed control of distributed generatorsBack to article page