Fig. 13From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesAttacks #11-#13 on WADI: including SAOS and MAOS attacksBack to article page