Fig. 7From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesAttack #1 on SWaT: single attack, one stageBack to article page