Research Article

Development of the ECAT Preprocessor with the Trust Communication Approach

Figure 6

(a) Developed simple PLC program and (b) MAC spoofing attack flow diagram.
(a)
(b)