Fig. 8From: A tri-level programming-based frequency regulation market equilibrium under cyber attacksCapacity payments under attackBack to article page