References Part 1 | part of Building an Effective Security Program for Distributed Energy Resources and Systems | Wiley Telecom books | IEEE Xplore