Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 10

Base node spoofing attack.