Fig. 12From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesAttack #10 on WADI: single attack, one stageBack to article page