Using a packet manipulation tool for security analysis of industrial network protocols
2015 ◽
Vol 9
(10)
◽
pp. 1072-1084
◽
2015 ◽
pp. 121-169
◽