Fig. 5From: A tri-level programming-based frequency regulation market equilibrium under cyber attacksFRM clearing results without attack and defenseBack to article page