Fig. 9From: A tri-level programming-based frequency regulation market equilibrium under cyber attacksCapacity payment deviations under attackBack to article page