Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 9

Node registration spoofing attack for behaviors (1) and (2).