Fig. 3From: A tri-level programming-based frequency regulation market equilibrium under cyber attacksNon-cooperative interplay between the attacker and the defender in the FRMBack to article page