Fig. 4From: A novel hybrid cybersecurity scheme against false data injection attacks in automated power systemsGOOSE Publisher and Subscriber in Typhoon HIL SchematicsBack to article page