Fig. 8From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesAttacks #2-#5 on SWaT: including SAOS, MAOS, and MAMS attacksBack to article page