Fig. 10From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesAttack #8 on SWaT: single attack, one stageBack to article page