Fig. 20From: A novel hybrid cybersecurity scheme against false data injection attacks in automated power systemsFunctional diagram of sequence content resolver for the SV protocolBack to article page