Fig. 9From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesAttacks #6 and #7 on SWaT: single attack, one stageBack to article page