Fig. 7From: A tri-level programming-based frequency regulation market equilibrium under cyber attacksFRM clearing results under attackBack to article page