Figure 2. The OCPP cyberattacks considered in this work.
All published articles are preserved here permanently: