Fig. 2From: A tri-level programming-based frequency regulation market equilibrium under cyber attacksClearing process using a merit order market modelBack to article page