Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 18

Traffic traces during a Base Node spoofing attack.