Fig. 19From: A novel hybrid cybersecurity scheme against false data injection attacks in automated power systemsBlock diagram of sequence content resolver for the SV protocolBack to article page