Fig. 5From: Cascading effects of cyber-attacks on interconnected critical infrastructureExample of a Interconnected SystemBack to article page