I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
10
,
No
.
2
,
A
p
r
il
2
0
2
0
,
p
p
.
135
9
~
1
3
6
6
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
10
i
2
.
pp
1
3
5
9
-
1
3
6
6
1359
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
Aug
m
e
ntatio
n of
a
SCADA
bas
ed f
irew
a
ll ag
a
inst f
o
reig
n
ha
ck
ing
dev
ices
Abhi
s
he
k
M
un
g
ek
a
r
1
,
Ya
s
hr
a
j
So
la
nk
i
2
,
R.
Sw
a
rna
la
t
ha
3
1,
2
De
p
a
rtm
e
n
t
o
f
El
e
c
tro
n
ics
a
n
d
In
stru
m
e
n
tatio
n
E
n
g
in
e
e
rin
g
,
Bir
l
a
In
stit
u
te
o
f
T
e
c
h
n
o
lo
g
y
a
n
d
S
c
ien
c
e
,
P
il
a
n
i
Du
b
a
i
Ca
m
p
u
s,
A
c
a
d
e
m
ic Ci
t
y
,
Du
b
a
i,
U
n
it
e
d
A
ra
b
Em
irate
s
3
De
p
a
rtme
n
t
o
f
El
e
c
tri
c
a
l
a
n
d
El
e
c
tro
n
ics
En
g
i
n
e
e
rin
g
,
Birl
a
I
n
stit
u
te o
f
T
e
c
h
n
o
l
o
g
y
a
n
d
S
c
ien
c
e
,
P
il
a
n
i,
Du
b
a
i
Ca
m
p
u
s,
A
c
a
d
e
m
ic Ci
t
y
,
Du
b
a
i,
U
n
it
e
d
A
ra
b
Em
irate
s
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Sep
2
9
,
2
0
1
9
R
ev
i
s
ed
Oct
7
,
2019
A
cc
ep
ted
Oct
1
5
,
2
0
1
9
A
n
In
d
u
strial
f
ire
w
a
ll
is a
s
y
ste
m
u
se
d
to
su
p
e
rv
ise
a
n
d
re
g
u
late
tra
ff
ic t
o
a
n
d
f
ro
m
a
n
e
t
w
o
rk
f
o
r
th
e
p
u
rp
o
se
o
f
s
e
c
u
rin
g
a
p
p
li
a
n
c
e
s
o
n
a
n
e
tw
o
rk
.
It
a
n
a
ly
z
e
s
th
e
d
a
ta
p
a
ss
in
g
th
ro
u
g
h
it
t
o
a
n
a
lrea
d
y
d
e
f
in
e
d
s
u
rv
e
il
lan
c
e
c
rit
e
ria
o
r
p
ro
to
c
o
ls,
d
isc
a
rd
in
g
d
a
ta
th
a
t
d
o
e
s
n
o
t
m
e
e
t
th
e
p
ro
t
o
c
o
l’s
re
q
u
irem
e
n
ts.
In
e
ff
e
c
t,
it
is
a
f
i
lt
e
r
p
re
v
e
n
ti
n
g
u
n
d
e
sira
b
le
n
e
tw
o
rk
traff
i
c
a
n
d
se
lec
ti
v
e
l
y
li
m
it
in
g
th
e
t
y
p
e
o
f
tran
s
m
issio
n
th
a
t
o
c
c
u
rs
b
e
twe
e
n
a
se
c
u
re
d
tran
sm
is
sio
n
li
n
e
.
I
n
t
h
is
re
se
a
rc
h
p
a
p
e
r
a
S
CAD
A
b
a
se
d
F
irew
a
ll
is
im
p
le
m
e
n
ted
f
o
r
p
ro
tec
ti
o
n
o
f
th
e
d
a
ta
tran
sm
issio
n
t
o
a
P
L
C,
a
g
a
in
st
e
x
tern
a
l
h
a
c
k
in
g
d
e
v
ice
s.
T
h
is
f
ire
w
a
ll
is
v
irt
u
a
ll
y
e
x
p
o
se
d
to
se
v
e
ra
l
e
x
tern
a
l
h
a
c
k
e
rs
a
n
d
th
e
d
e
g
re
e
o
f
v
u
ln
e
ra
b
il
it
y
is
c
a
r
e
f
u
ll
y
stu
d
ied
,
in
o
rd
e
r
to
d
e
v
e
lo
p
a
n
i
d
e
a
l
F
i
re
w
a
ll
.
K
ey
w
o
r
d
s
:
Fire
w
a
ll
I
n
d
u
s
tr
ial
co
n
tr
o
l s
y
s
te
m
s
P
L
C
SC
A
D
A
-
H
MI
Si
m
u
lato
r
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
R
S
w
ar
n
a
lath
a
,
Dep
ar
t
m
en
t o
f
E
lectr
ical
an
d
E
lectr
o
n
ics
E
n
g
i
n
ee
r
in
g
,
B
ir
la
I
n
s
titu
te
o
f
T
ec
h
n
o
lo
g
y
an
d
Scien
ce
,
P
ilan
i,
D
u
b
ai
C
a
m
p
u
s
Du
b
ai
I
n
ter
n
a
tio
n
al
A
ca
d
e
m
ic
C
it
y
,
D
u
b
ai,
Un
i
ted
A
r
ab
E
m
ir
ates
.
E
m
ail:
s
w
ar
n
alat
h
a
@
d
u
b
ai.
b
it
s
-
p
ila
n
i.a
c.
in
1.
I
NT
RO
D
UCT
I
O
N
I
n
th
e
y
ea
r
2
0
0
0
,
an
u
n
n
a
m
ed
s
e
w
a
g
e
co
n
tr
o
l
s
y
s
te
m
i
n
Qu
ee
n
s
lan
d
,
Au
s
tr
alia,
f
ac
ed
s
ev
er
al
d
if
f
ic
u
lt
ies
f
r
o
m
t
h
e
m
o
m
en
t
it
w
a
s
in
s
talled
b
y
t
h
e
m
a
n
u
f
ac
tu
r
er
.
Mo
s
t
o
f
t
h
ese
p
r
o
b
le
m
s
co
n
ti
n
u
ed
f
o
r
s
ev
er
al
o
f
t
h
e
f
o
llo
w
in
g
m
o
n
t
h
s
;
w
it
h
p
u
m
p
s
n
o
t
r
esp
o
n
d
i
n
g
a
n
d
r
u
n
n
i
n
g
w
h
en
r
eq
u
ir
ed
to
,
a
co
m
p
lete
lo
s
s
o
f
tr
an
s
m
i
s
s
io
n
b
et
w
ee
n
t
h
e
co
n
tr
o
l
r
o
o
m
a
n
d
th
e
p
u
m
p
i
n
g
s
tatio
n
s
etc.
T
h
ese
lead
to
s
ev
er
al
m
o
n
th
s
o
f
f
lo
o
d
in
g
i
n
s
e
v
er
al
o
f
t
h
e
n
ea
r
b
y
co
m
m
u
n
itie
s
an
d
a
r
iv
er
w
i
th
s
e
v
er
al
to
n
s
o
f
s
e
w
a
g
e.
An
i
n
s
i
g
h
t
i
n
to
s
e
v
er
al
o
f
th
e
in
d
u
s
tr
ial
c
y
b
er
-
attac
k
s
is
t
h
at
th
e
y
ar
e
v
er
y
d
i
f
f
ic
u
lt
to
id
en
ti
f
y
,
th
i
s
ca
s
e
w
a
s
n
o
d
i
f
f
er
e
n
t.
T
h
e
attac
k
er
lin
k
ed
w
it
h
th
i
s
attac
k
m
an
a
g
ed
to
attac
k
t
h
e
s
y
s
te
m
a
to
tal
o
f
4
6
tim
e
s
,
u
n
t
il
t
h
e
u
n
k
n
o
w
n
e
n
tit
y
w
a
s
ca
u
g
h
t.
A
t
th
e
o
n
s
e
t
it
w
as
c
o
n
s
id
er
ed
th
at
a
lea
k
a
g
e
i
n
t
h
e
p
ip
es
m
u
s
t
h
av
e
b
ee
n
t
h
e
r
o
o
t
ca
u
s
e
o
f
al
l
t
h
e
p
r
o
b
lem
s
.
On
l
y
af
ter
m
o
n
t
h
s
o
f
d
ata
lo
g
g
in
g
i
t
w
a
s
d
is
co
v
er
ed
th
at
s
ev
er
al
o
f
th
e
co
n
tr
o
ller
s
w
er
e
h
ac
k
ed
,
an
d
w
o
u
ld
ac
t
iv
ate
th
e
v
a
lv
e
s
r
an
d
o
m
l
y
w
it
h
o
u
t
a
co
m
m
an
d
b
ein
g
in
i
tiated
at
th
e
r
e
m
o
te
co
n
tr
o
l
r
o
o
m
s
.
L
a
ter
it
w
as
d
is
co
v
er
ed
t
h
at,
o
n
e
o
f
t
h
e
e
x
-
e
m
p
lo
y
ee
o
f
th
e
c
o
n
tr
ac
to
r
co
m
p
an
y
w
a
s
b
eh
i
n
d
all
th
e
s
e
h
ac
k
i
n
g
atte
m
p
ts
i
n
o
r
d
er
to
b
e
h
ir
ed
b
y
t
h
e
co
m
p
a
n
y
to
r
eso
l
v
e
th
ese
i
s
s
u
es
[
1
]
.
T
h
e
ab
o
v
e
ca
s
e
s
tu
d
y
is
a
n
i
n
d
icato
r
o
n
w
h
y
p
r
o
tecti
n
g
th
e
s
e
i
n
d
u
s
tr
ial
co
n
tr
o
l
s
y
s
te
m
s
i
s
cr
u
cial.
Dev
elo
p
m
e
n
t o
f
h
i
g
h
l
y
s
o
p
h
i
s
ticated
in
d
u
s
tr
ial
f
ir
e
w
a
lls
ca
n
p
r
ev
en
t s
u
ch
a
h
ap
h
az
ar
d
[
2
,
3
]
.
I
n
th
e
s
e
r
ec
en
t
ti
m
e
s
,
I
n
d
u
s
tr
i
al
co
n
tr
o
l
s
y
s
te
m
s
h
av
e
i
n
cr
e
ased
th
eir
d
ep
en
d
en
ce
o
n
s
ev
er
al
t
y
p
ical
in
ter
n
e
t
p
r
o
to
co
ls
s
u
ch
as
E
th
er
n
et,
T
C
P
/I
P
an
d
W
in
d
o
w
s
f
o
r
t
r
an
s
m
is
s
io
n
o
f
s
e
n
s
i
ti
v
e
o
r
n
o
n
-
s
e
n
s
iti
v
e
in
f
o
r
m
atio
n
.
Util
izatio
n
o
f
t
h
ese
p
r
o
to
co
ls
in
lar
g
e
s
ca
le
in
d
u
s
tr
ial
s
y
s
te
m
s
h
a
v
e
b
ec
o
m
e
a
lo
t
m
o
r
e
n
et
w
o
r
k
ed
an
d
ea
s
il
y
r
ea
ch
ab
l
e
f
r
o
m
a
n
y
p
o
r
tio
n
o
f
t
h
e
w
o
r
ld
,
m
a
k
i
n
g
th
e
m
a
lo
t
m
o
r
e
v
u
l
n
er
ab
le
to
a
c
y
b
er
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
2
,
A
p
r
il
2
0
2
0
:
1
3
5
9
-
136
6
1360
th
r
ea
t
.
Mo
r
eo
v
er
,
th
e
r
is
i
n
g
r
elian
ce
o
v
er
i
n
ter
n
et
-
co
n
n
ec
t
ed
d
ev
ices,
also
k
n
o
w
n
a
s
I
n
ter
n
et
o
f
t
h
in
g
s
i
s
m
ak
in
g
t
h
e
d
ev
ices
m
o
r
e
s
u
s
c
ep
tib
le
to
C
y
b
er
-
attac
k
s
.
Kee
p
in
g
all
t
h
e
ab
o
v
e
r
is
k
s
i
n
m
i
n
d
,
w
h
e
n
Su
p
er
v
is
o
r
y
c
o
n
tr
o
l
an
d
d
ata
ac
q
u
is
it
io
n
e
n
g
i
n
ee
r
s
o
r
ex
p
er
ts
ar
e
q
u
esti
o
n
ed
o
v
er
th
e
ac
t
u
al
th
r
ea
t
s
to
i
n
d
u
s
tr
i
al
co
n
tr
o
l
s
y
s
te
m
s
,
o
f
ten
ca
s
t
a
b
li
n
d
e
y
e
o
v
er
th
e
e
n
tire
i
s
s
u
e
b
y
clai
m
i
n
g
th
at
s
p
ec
iall
y
d
es
ig
n
ed
co
m
m
u
n
icat
io
n
p
r
o
to
co
ls
a
n
d
ex
clu
s
i
v
e
a
u
to
m
atio
n
s
y
s
te
m
s
w
o
u
ld
i
n
co
r
p
o
r
ate
to
all
t
h
e
e
x
ter
n
a
l
f
ac
to
r
s
a
f
f
ec
tin
g
t
h
e
s
y
s
te
m
s
[4
-
7
]
.
T
h
e
p
r
o
p
o
s
ed
id
eo
lo
g
y
,
s
u
g
g
e
s
ts
a
S
C
A
D
A
b
ased
Fi
r
e
w
all
w
h
ic
h
i
s
i
m
p
le
m
en
ted
f
o
r
s
h
ield
in
g
t
h
e
d
ata
tr
an
s
m
is
s
io
n
to
a
P
L
C
,
ag
ain
s
t
e
x
tr
in
s
ic
h
ac
k
i
n
g
g
iz
m
o
s
.
T
h
is
f
ir
e
w
all
i
s
v
ir
t
u
all
y
ex
p
o
s
ed
to
ex
tr
i
n
s
ic
h
ac
k
er
s
tr
y
i
n
g
to
o
v
er
r
id
e
T
C
P
in
ter
f
ac
e
p
r
o
to
co
ls
an
d
f
u
r
th
er
i
m
p
r
o
v
is
at
io
n
s
ar
e
i
n
co
r
p
o
r
ated
b
ased
o
n
th
e
p
atter
n
o
b
s
er
v
ed
in
o
r
d
er
to
d
ev
elo
p
a
g
er
m
an
e
f
ir
e
w
all.
2.
G
E
NE
R
AL
I
Z
E
D
O
VE
RVI
E
W
O
N
F
I
R
E
WA
L
L
S
Fire
w
a
lls
ar
e
cr
u
cial
ac
ce
s
s
o
r
ies
i
n
t
h
e
f
ie
ld
o
f
c
y
b
er
s
ec
u
r
it
y
,
f
o
r
p
r
o
tectio
n
o
f
s
e
v
er
al
in
d
u
s
tr
ia
l
b
ased
P
C
’
s
,
co
n
tr
o
l s
y
s
te
m
s
o
r
as in
th
e
ab
o
v
e
ca
s
e
a
lar
g
e
s
ca
le
I
n
d
u
s
tr
ial
s
e
w
ag
e
s
y
s
te
m
s
.
2
.
1
.
I
m
po
rt
a
nce
o
f
f
irew
a
lls
A
w
id
e
r
an
g
e
o
f
f
ir
e
w
all
s
p
er
s
is
t
i
n
to
d
ay
’
s
m
ar
k
e
t,
w
i
th
u
n
iq
u
e
attr
ib
u
te
s
ass
o
ciate
d
w
it
h
ea
ch
o
n
e
o
f
th
e
m
.
T
h
e
t
w
o
m
aj
o
r
ca
te
g
o
r
ies
o
f
d
is
ti
n
ctio
n
ar
e
Ho
s
t
f
ir
e
w
all
s
an
d
Net
w
o
r
k
ed
Fi
r
e
w
all
s
.
T
h
e
Ho
s
t
f
ir
e
w
all
s
ar
e
in
s
talled
o
n
P
er
s
o
n
al
C
o
m
p
u
ter
s
o
r
in
s
ev
er
a
l
o
p
er
atin
g
s
y
s
te
m
s
,
w
h
ich
ar
e
m
a
in
l
y
s
o
f
t
w
ar
e
b
ased
.
T
h
ese
w
i
n
d
o
w
s
o
p
er
ati
n
g
b
ased
f
ir
e
w
all
s
in
s
talled
in
alm
o
s
t
ev
er
y
co
m
p
u
ter
o
r
PC
ar
e
th
ese
d
ay
s
to
p
r
o
tect
th
e
m
f
r
o
m
m
al
icio
u
s
attac
k
s
o
v
er
th
e
i
n
ter
n
et
[
8
-
1
0
]
.
T
h
e
later
ty
p
e
o
f
f
ir
e
w
all
is
ca
lled
a
n
et
w
o
r
k
ed
f
ir
e
w
al
l
an
d
as
th
e
n
a
m
e
s
u
g
g
est
s
,
is
t
h
e
t
y
p
e
o
f
f
ir
e
w
all
w
h
ic
h
p
ar
t
o
f
a
n
et
w
o
r
k
ed
s
y
s
te
m
u
n
li
k
e
t
h
e
h
o
s
t
b
ased
f
ir
e
w
all.
Fig
u
r
e1
is
a
d
ep
ictio
n
o
f
s
u
c
h
t
y
p
e
o
f
in
d
u
s
tr
ial
n
e
t
w
o
r
k
ed
f
ir
e
walls.
T
h
ese
t
y
p
es
o
f
n
et
w
o
r
k
s
ca
n
u
s
u
all
y
b
e
f
o
u
n
d
in
lar
g
e
s
ca
le
in
d
u
s
tr
ies
,
w
h
ic
h
s
to
r
e
d
ata
o
n
a
ce
n
tr
al
ized
s
er
v
er
,
w
h
ich
ca
n
ea
s
il
y
b
e
ac
ce
s
s
ed
b
y
s
ev
er
al
a
u
t
h
o
r
ized
p
r
o
f
ess
io
n
als
b
ased
o
n
ac
ce
s
s
co
d
es.
T
h
ese
Dis
ti
n
cti
v
e
f
ir
e
w
alls
ar
e
u
til
ized
in
v
ar
io
u
s
s
ites
w
i
th
in
a
n
e
t
w
o
r
k
ed
s
y
s
te
m
to
p
r
o
v
id
e
d
if
f
er
en
t
t
y
p
es
o
f
s
ec
u
r
it
y
a
s
p
ar
t
o
f
a
s
tr
ateg
y
.
T
h
ey
h
elp
in
s
a
f
e
g
u
ar
d
i
n
g
th
e
li
n
k
b
et
w
ee
n
co
m
p
a
n
y
’
s
n
et
w
o
r
k
a
n
d
t
h
e
i
n
d
u
s
tr
ial
n
et
w
o
r
k
,
b
y
s
ec
u
r
i
n
g
th
e
m
a
g
ain
s
t
h
ac
k
er
s
.
L
i
k
e
w
i
s
e,
s
ev
er
al
t
y
p
es
o
f
f
ir
e
w
all
s
ar
e
d
ev
is
ed
w
it
h
s
p
ec
if
ic
s
et
o
f
r
u
les,
to
li
m
it
a
s
p
ec
if
ic
t
y
p
e
o
f
co
m
m
u
n
icati
o
n
.
T
h
e
co
n
ce
p
t
o
f
d
ec
is
iv
el
y
li
m
iti
n
g
co
m
m
u
n
ic
atio
n
b
et
w
ee
n
m
e
m
b
er
s
w
it
h
i
n
th
e
n
et
w
o
r
k
,
as
w
el
l
as
s
ep
ar
atin
g
o
f
v
ar
io
u
s
n
et
w
o
r
k
ar
ea
s
f
r
o
m
ea
ch
o
t
h
er
,
is
k
n
o
w
n
as
Z
o
n
e
s
an
d
C
o
n
d
u
its
[
1
1
]
.
Fig
u
r
e
1
.
Gen
er
alize
d
I
n
d
u
s
tr
i
al
Fire
w
a
ll
w
o
r
k
i
n
g
d
ia
g
r
a
m
2
.
2
.
T
he
diff
er
ence
s
bet
w
ee
n
I
T
a
nd
ind
u
s
t
ria
l f
irew
a
lls
2
.
2
.
1
.
Securi
t
y
prio
rit
y
T
h
e
f
ir
s
t
a
n
d
f
o
r
e
m
o
s
t
d
if
f
er
en
ce
b
et
w
ee
n
t
h
e
I
n
d
u
s
tr
ial
a
n
d
I
.
T
f
ir
e
w
al
ls
i
s
i
n
ter
m
s
o
f
s
ec
u
r
it
y
p
r
io
r
ity
.
I
n
th
e
ca
s
e
o
f
I
n
d
u
s
tr
ial
C
o
n
tr
o
l
S
y
s
te
m
(
I
C
S),
f
o
cu
s
is
s
h
if
ted
to
th
e
av
aila
b
ilit
y
,
v
is
ib
il
it
y
in
v
ar
io
u
s
p
r
o
ce
s
s
es
a
n
d
th
e
o
p
er
atio
n
s
in
v
o
lv
ed
,
in
teg
r
it
y
a
n
d
at
last
th
e
co
n
f
id
en
t
ialit
y
asp
ec
t.
On
th
e
o
th
er
h
an
d
,
I
T
h
as
k
ep
t
its
f
ir
s
t
p
r
io
r
ity
o
n
co
n
f
id
en
tial
it
y
f
o
llo
w
ed
b
y
i
n
te
g
r
it
y
a
n
d
at
th
e
e
n
d
to
w
ar
d
s
av
ailab
ilit
y
[
1
2
]
.
2
.
2
.
2
.
Serv
ice
pro
v
idi
ng
a
nd
la
t
ency
I
n
ter
m
s
o
f
late
n
c
y
I
C
S
is
al
wa
y
s
b
ased
o
n
th
e
r
ea
l
-
ti
m
e
r
eq
u
ir
e
m
e
n
t
s
w
h
ic
h
is
o
f
a
v
an
ta
g
e
p
o
in
t
as
f
o
r
I
T
th
e
r
esp
o
n
s
e
ti
m
es
ten
d
to
b
e
v
ar
y
i
n
g
in
n
at
u
r
e.
I
C
S
i
s
f
u
n
ctio
n
al
2
4
h
o
u
r
s
b
y
7
d
ay
s
b
y
3
6
5
d
ay
s
p
er
y
ea
r
w
h
er
ea
s
a
s
I
T
n
ee
d
s
to
b
e
r
estar
ted
w
h
e
n
it i
s
n
ee
d
ed
to
d
o
s
o
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
u
g
men
ta
tio
n
o
f a
S
C
A
DA
b
a
s
ed
fir
ewa
ll a
g
a
in
s
t fo
r
eig
n
h
a
ck
in
g
d
ev
ices
(
A
b
h
is
h
ek
Mu
n
g
ek
a
r
)
1361
2
.
2
.
3
.
So
f
t
w
a
re
r
o
bu
s
t
nes
s
Fo
r
I
C
S,
ap
ar
t
f
r
o
m
t
h
e
ca
s
e
o
f
a
b
en
i
g
n
e
n
v
ir
o
n
m
en
t
p
r
o
t
o
co
ls
ten
d
to
f
ail
o
n
l
y
w
h
e
n
c
h
alle
n
g
ed
.
Fo
r
I
T
,
th
er
e
ar
e
i
m
p
le
m
en
ta
t
io
n
s
w
h
ic
h
ar
e
p
u
t
u
n
d
er
co
n
t
in
u
o
u
s
h
ac
k
er
s
cr
u
ti
n
y
a
n
d
th
en
t
h
e
w
ea
k
n
es
s
es
ar
e
eli
m
i
n
ated
.
2
.
2
.
4
.
T
e
chnica
l a
nd
ec
o
no
mic
s
pa
n
On
e
k
e
y
d
i
f
f
er
e
n
ce
b
et
w
ee
n
I
C
S
an
d
I
T
is
th
e
tec
h
n
ica
l
an
d
ec
o
n
o
m
ic
l
if
e
s
p
an
.
T
h
e
p
er
io
d
s
t
y
p
icall
y
u
s
ed
f
o
r
‘
w
r
iti
n
g
-
o
f
f
’
I
C
S a
r
e
v
er
y
lo
n
g
w
h
en
co
m
p
ar
ed
to
th
e
p
er
io
d
s
in
w
h
ic
h
o
r
g
an
izatio
n
s
‘
w
r
ite
o
f
f
’
I
T
.
T
y
p
ical
I
C
S
t
h
er
ef
o
r
e
h
av
e
an
in
s
talled
b
ase
o
f
a
g
in
g
tec
h
n
o
lo
g
y
,
th
e
s
o
-
ca
lle
d
leg
ac
y
I
C
S,
w
h
ic
h
o
f
ten
i
n
cl
u
d
es
s
u
p
p
lier
-
s
p
ec
i
f
ic
ap
p
licatio
n
s
an
d
h
ar
d
w
ar
e,
an
d
d
ec
ad
es
-
o
ld
co
m
m
u
n
ica
tio
n
p
r
o
to
co
ls
an
d
h
ar
d
w
ar
e
[
1
3
]
.
2
.
2
.
5
.
Depre
cia
t
io
n
I
C
S
r
ec
o
r
d
s
ab
o
u
t
1
0
to
2
5
y
ea
r
s
o
f
th
e
d
ep
r
ec
iatio
n
v
al
u
e
w
h
er
ea
s
I
T
o
n
l
y
r
ec
o
r
d
s
3
to
5
y
ea
r
s
w
h
ic
h
f
ar
les
s
i
n
co
m
p
ar
is
o
n
t
o
th
e
I
C
S.
2
.
2
.
6
.
Sa
f
et
y
ins
t
ru
m
ent
ed
s
y
s
t
e
m
s
P
lan
t
s
a
f
et
y
is
a
cr
u
cial
p
ar
t
o
f
p
lan
t
o
p
er
atio
n
,
an
d
I
C
S.
T
h
er
ef
o
r
e,
th
e
I
C
S
o
f
te
n
i
n
clu
d
e
i
n
teg
r
ated
,
y
et
d
is
ti
n
cti
v
e,
s
af
e
t
y
i
n
s
tr
u
m
en
ted
s
y
s
te
m
s
(
SISs).
T
h
e
SIS
is
r
esp
o
n
s
ib
le
f
o
r
en
s
u
r
i
n
g
a
n
d
m
ai
n
tai
n
in
g
th
e
s
a
f
e
o
p
er
atio
n
s
o
f
th
e
p
r
o
ce
s
s
b
y
p
laci
n
g
t
h
e
p
r
o
ce
s
s
in
to
a
s
af
e
s
tate
w
h
e
n
p
r
o
c
ess
co
n
d
itio
n
s
th
a
t
th
r
ea
ten
s
af
e
t
y
ar
e
d
etec
ted
.
I
T
s
y
s
te
m
s
h
a
v
e
n
o
s
y
s
te
m
s
an
alo
g
o
u
s
to
t
h
e
SIS
[
1
4
-
1
5
]
.
3.
I
NDUS
T
R
I
AL
F
I
RE
WAL
L
CO
NF
I
G
URA
T
I
O
N
T
o
f
in
o
is
a
m
o
d
er
n
ized
I
n
d
u
s
tr
ial
C
o
n
tr
o
l
S
y
s
te
m
f
ir
e
w
all,
w
h
ic
h
u
n
lik
e
it’s
I
.
T
f
ir
e
w
all
co
u
n
ter
p
ar
ts
al
s
o
ac
ce
p
ts
S
C
A
D
A
p
r
o
to
co
ls
.
T
h
is
p
ar
ticu
l
ar
p
r
o
j
ec
t
in
v
o
l
v
es
u
til
izatio
n
o
f
t
w
o
u
s
er
-
d
ef
i
n
ed
ass
ets
as
s
u
g
g
es
ted
in
Fi
g
u
r
e
2
.
SC
A
D
A
-
HM
I
a
n
d
P
L
C
ar
e
th
e
t
w
o
d
ef
i
n
ed
a
s
s
et
s
.
T
h
ese
ass
et
s
f
u
n
ct
io
n
o
n
th
e
b
asis
o
f
t
w
o
p
r
i
m
ar
ies
an
d
o
n
e
s
ec
o
n
d
ar
y
p
r
o
to
co
l.
T
h
e
tw
o
p
r
i
m
ar
y
p
r
o
to
co
ls
ar
e
m
a
n
d
ato
r
y
f
o
r
th
e
s
o
f
t
w
ar
e,
w
h
ile
t
h
e
s
ec
o
n
d
ar
y
p
r
o
to
co
ls
c
an
b
e
d
ef
in
ed
t
o
en
ab
le
s
ev
er
al
o
th
er
f
o
r
m
o
f
co
m
m
u
n
icatio
n
as
p
er
u
s
er
r
eq
u
ir
e
m
en
t.
Fig
u
r
e
2
.
User
-
d
ef
i
n
ed
ass
e
t d
esig
n
atio
n
3
.
1
.
Addres
s
re
s
o
lutio
n pro
t
o
co
l
T
h
e
First
an
d
f
o
r
e
m
o
s
t
p
r
o
to
co
l
b
ein
g
th
e
A
d
d
r
ess
r
eso
l
u
tio
n
p
r
o
to
co
l
(
A
R
P
)
,
w
h
ic
h
is
s
et
b
y
d
ef
au
lt
b
y
t
h
e
f
ir
e
w
a
ll
i
n
o
r
d
er
to
r
ec
o
g
n
ize
th
e
Ma
c
A
d
d
r
e
s
s
,
as
s
o
ciate
d
w
ith
a
g
i
v
e
n
in
t
er
n
et
la
y
er
ad
d
r
ess
,
lik
e
a
n
I
P
v
4
ad
d
r
ess
as
u
ti
lize
d
in
t
h
is
ca
s
e,
w
h
ic
h
is
i
m
p
o
r
t
an
t
f
o
r
th
e
f
u
n
ctio
n
i
n
g
o
f
in
te
r
n
et
p
r
o
to
co
l
s
u
ite.
T
h
is
is
a
d
is
tin
cti
v
el
y
b
ett
er
f
o
r
m
o
f
en
co
d
i
n
g
as
co
m
p
ar
ed
t
o
co
n
s
id
er
in
g
o
n
l
y
a
n
I
P
a
d
d
r
ess
o
f
th
e
d
ev
ice.
T
h
is
m
ap
p
in
g
p
r
o
ce
s
s
r
ed
u
ce
s
v
u
l
n
er
ab
ilit
y
to
w
ar
d
s
h
ac
k
i
n
g
b
y
a
s
i
g
n
i
f
ica
n
t
m
ar
g
in
.
I
t
is
v
ital
to
k
ee
p
th
e
f
lo
w
o
f
d
ata
b
i
-
d
ir
ec
tio
n
al
f
o
r
an
y
g
i
v
en
a
s
s
et.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
2
,
A
p
r
il
2
0
2
0
:
1
3
5
9
-
136
6
1362
3
.
2
.
T
ra
ns
f
er
co
ntr
o
l
P
ro
t
o
co
l
T
h
e
s
ec
o
n
d
p
r
im
ar
y
p
r
o
to
co
l
is
th
e
M
ODB
US/T
C
P
p
r
o
to
c
o
l.T
h
is
is
r
esp
o
n
s
ib
le
f
o
r
tr
an
s
m
is
s
io
n
o
f
d
ata
f
r
o
m
o
n
e
u
s
er
to
o
th
er
,
b
y
d
ef
i
n
i
n
g
d
is
t
in
ct
s
et
o
f
r
u
l
es.
T
h
e
p
er
m
itted
co
m
m
u
n
ic
atio
n
li
n
es
f
o
r
th
is
p
r
o
to
co
l
ar
e
en
f
o
r
ce
d
.
T
h
is
m
ea
n
s
th
at
o
n
l
y
u
n
i
-
d
ir
ec
tio
n
al
f
lo
w
o
f
d
ata
i
s
p
er
m
it
ted
alo
n
g
w
it
h
th
i
s
p
r
o
to
co
l.
T
h
e
p
er
m
i
s
s
io
n
is
en
f
o
r
ce
d
f
r
o
m
th
e
S
C
A
D
A
-
HM
I
to
t
h
e
P
L
C
.
T
h
is
is
d
ev
elo
p
ed
o
n
t
h
e
b
asi
s
o
f
ce
r
tai
n
t
y
p
es
o
f
f
u
n
ctio
n
co
d
es
as
s
u
g
g
e
s
ted
i
n
Fi
g
u
r
e
3
,
th
ese
f
u
n
ctio
n
co
d
es
en
ab
le
th
e
f
ir
e
w
al
l
to
r
ea
d
an
d
w
r
ite
co
ils
,
d
is
cr
ete
i
n
p
u
ts
,
h
o
ld
i
n
g
an
d
in
p
u
t
r
eg
is
ter
i
n
ad
d
itio
n
r
ep
o
r
tin
g
th
e
Sla
v
e
I
D.
W
h
i
le
d
ef
in
in
g
t
h
e
a
s
s
et
s
f
o
r
th
e
SC
AD
A
-
HM
I
an
d
th
e
P
L
C
in
t
h
e
ab
o
v
e
p
r
o
to
co
l,
it
is
cr
itical
to
d
ef
in
e
t
h
eir
r
esp
ec
tiv
e
M
AC
an
d
I
P
ad
d
r
ess
e
s.
Fig
u
r
e
3
.
Fu
n
c
tio
n
co
d
es set
-
up
4.
M
AST
E
R
AND
S
L
AV
E
SI
M
UL
AT
O
R
CO
NF
I
G
URA
T
I
O
NS
A
t
y
p
ical
m
a
s
ter
an
d
s
la
v
e
id
eo
lo
g
y
is
i
m
p
le
m
e
n
ted
i
n
th
i
s
s
ec
tio
n
,
w
h
er
e
i
n
f
o
r
m
atio
n
g
en
er
ated
at
th
e
s
la
v
e
en
d
o
f
t
h
e
s
y
s
te
m
w
i
ll b
e
ex
tr
ac
ted
b
y
t
h
e
m
a
s
ter
.
4
.
1
.
M
o
db
us
s
i
m
ula
t
o
r
(
s
la
v
e
)
T
h
is
p
ar
ticu
lar
s
i
m
u
lato
r
as
s
u
g
g
es
ted
in
Fig
u
r
e
4
w
ill
v
ir
t
u
all
y
r
ep
r
esen
t
th
e
P
r
o
g
r
am
m
ab
le
L
o
g
i
c
C
o
n
tr
o
ller
.
T
h
e
P
L
C
w
ill
m
i
m
ic
a
s
a
s
la
v
e
to
t
h
e
SC
A
D
A
HM
I
.
Mo
d
Si
m
6
4
co
n
n
ec
tio
n
in
cl
u
d
es
co
n
n
ec
tin
g
to
th
e
Mo
d
b
u
s
/T
C
P
s
er
v
er
.
T
h
e
f
o
llo
w
i
n
g
w
i
n
d
o
w
in
c
lu
d
e
s
t
h
e
ad
d
r
ess
o
f
t
h
e
o
f
f
s
et
p
r
o
v
id
ed
,
L
e
n
g
t
h
o
f
th
e
ar
r
a
y
,
De
v
ice
id
a
n
d
t
h
e
t
y
p
e
o
f
MO
DB
US
p
o
in
t
t
y
p
e
i
n
tr
o
d
u
ce
d
.
Di
f
f
er
e
n
t
p
o
i
n
t
t
y
p
es
ca
n
b
e
a
s
s
i
g
n
ed
b
ased
o
n
t
h
e
u
s
er
-
r
eq
u
ir
e
m
e
n
t;
th
e
s
e
i
n
cl
u
d
e
Ho
ld
in
g
r
e
g
is
ter
s
,
I
n
p
u
t
r
eg
i
s
ter
s
,
C
o
il
s
tat
u
s
a
n
d
I
n
p
u
t
s
tat
u
s
.
Fo
r
th
e
in
te
n
t o
f
t
h
i
s
p
r
o
j
ec
t,
I
n
p
u
t
R
eg
i
s
ter
s
h
av
e
b
ee
n
co
n
s
id
er
ed
.
Fig
u
r
e
4
.
Mo
d
b
u
s
P
L
C
s
i
m
u
la
to
r
co
n
f
ig
u
r
atio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
u
g
men
ta
tio
n
o
f a
S
C
A
DA
b
a
s
ed
fir
ewa
ll a
g
a
in
s
t fo
r
eig
n
h
a
ck
in
g
d
ev
ices
(
A
b
h
is
h
ek
Mu
n
g
ek
a
r
)
1363
4
.
2
.
I
nte
ra
ct
iv
e
g
ra
ph
ica
l
SCADA
s
y
s
t
e
m
(
I
G
SS
)
I
n
ter
ac
tiv
e
Gr
ap
h
ical
S
C
A
D
A
s
y
s
te
m
is
an
au
to
m
atio
n
b
ased
s
o
f
t
w
ar
e
d
ev
elo
p
ed
b
y
Sch
n
eid
er
elec
tr
ic.
I
n
th
e
f
o
llo
w
i
n
g
s
ec
t
io
n
s
,
t
h
e
s
o
f
t
w
ar
e
h
as
b
ee
n
u
tili
ze
d
to
d
ev
elo
p
t
h
e
h
u
m
an
u
s
er
i
n
ter
f
ac
e
f
o
r
ac
ce
s
s
i
n
g
d
ata
f
r
o
m
th
e
P
L
C
s
i
m
u
lato
r
[
1
6
]
.
4
.
2
.
1
.
SCADA
-
H
M
I
(
m
a
s
t
er
)
T
h
e
s
y
s
te
m
co
n
f
i
g
u
r
atio
n
o
f
th
i
s
s
o
f
t
w
ar
e,
i
n
v
o
lv
e
s
s
etti
n
g
u
p
a
r
e
m
o
te
an
d
lo
ca
l
I
P
.
T
h
is
is
f
o
llo
w
ed
b
y
s
elec
tin
g
t
h
e
p
r
o
to
co
l
o
v
er
w
h
ic
h
t
h
e
tr
an
s
m
i
s
s
io
n
o
f
d
ata
o
cc
u
r
s
.
T
h
e
p
r
o
to
c
o
l
u
s
ed
is
MO
DB
US/T
C
P
.
T
h
e
o
f
f
s
et
i
s
d
ef
i
n
ed
h
er
e,
s
u
c
h
t
h
at
it
p
o
in
ts
to
t
h
e
p
o
s
itio
n
o
f
th
e
d
ata
ac
q
u
ir
ed
f
r
o
m
th
e
s
la
v
e.
Af
ter
th
e
HM
I
is
co
n
f
ig
u
r
ed
,
th
e
d
esig
n
m
o
d
e
is
s
elec
ted
f
o
r
d
ef
in
in
g
ta
g
n
a
m
e,
t
y
p
e
an
d
attr
ib
u
tes.
On
ce
th
e
ta
g
i
s
d
ef
i
n
ed
,
th
e
s
i
m
u
latio
n
i
s
r
ea
d
y
to
u
s
e
[
1
7
]
T
h
is
p
r
o
j
ec
t
u
tili
ze
s
a
f
lo
w
d
ef
i
n
ed
p
ar
a
m
eter
,
w
h
ic
h
ca
n
b
e
cr
ea
ted
b
y
u
s
i
n
g
t
h
e
d
ef
i
n
it
io
n
f
u
n
ctio
n
in
th
e
I
G
SS
s
o
f
t
w
ar
e.
T
h
e
ar
ea
p
r
o
p
er
ties
em
p
lo
y
ed
in
t
h
is
s
ec
tio
n
co
n
s
is
t
o
f
d
ef
i
n
in
g
a
d
ef
au
l
t
d
r
iv
er
,
s
u
itab
le
f
o
r
th
e
co
m
m
u
n
ica
tio
n
b
et
w
ee
n
t
h
e
Sla
v
e
an
d
th
e
m
aster
.
T
h
e
d
ef
au
l
t
d
r
iv
er
u
s
e
d
is
a
De
m
o
-
s
tatio
n
f
o
r
7
T
MO
DT
C
P
.
T
h
e
f
lo
w
d
e
f
i
n
ed
o
b
j
ec
t
cr
ea
tio
n
tak
es
p
lace
w
it
h
r
esp
ec
t
to
o
b
j
ec
t
ty
p
e.
T
h
e
o
b
j
ec
t
ty
p
e
d
ef
in
ed
i
s
an
alo
g
.
T
h
is
i
s
f
o
ll
o
w
ed
b
y
s
e
lectio
n
o
f
s
y
m
b
o
l
s
u
n
d
er
t
h
e
S
y
m
b
o
l
d
e
f
i
n
itio
n
t
ab
le.
I
m
p
le
m
e
n
ti
n
g
th
e
en
ab
le
o
p
tio
n
,
allo
w
s
t
h
e
u
s
er
to
s
u
p
er
v
is
e
t
h
e
v
alu
e
o
r
s
t
ate
o
f
th
e
f
lo
w
.
T
h
e
s
u
b
s
eq
u
e
n
t
ato
m
m
ap
p
in
g
ca
teg
o
r
y
w
ill
h
an
d
le
t
h
e
ato
m
p
r
o
p
er
ties
an
d
th
e
s
la
v
e
o
f
f
s
et
ad
d
r
ess
E
n
ab
lin
g
.
T
h
e
ac
t
u
al
v
al
u
e
o
p
tio
n
p
r
o
v
es
to
b
e
v
er
y
d
ec
is
i
v
e,
as
i
t
e
n
s
u
r
es
th
e
o
r
ig
i
n
al
d
a
ta
is
ca
p
tu
r
ed
f
r
o
m
th
e
Sla
v
e
[
1
8
-
2
0
]
.
T
h
e
s
lav
e
o
f
f
s
et
ad
d
r
ess
in
c
l
u
d
es
d
ef
i
n
i
n
g
t
h
e
d
ata
t
y
p
e
as
R
ea
d
in
p
u
t
r
eg
i
s
ter
s
.
T
h
is
is
d
o
n
e
in
-
o
r
d
er
to
co
-
r
elate
w
i
th
t
h
e
s
la
v
e.
T
h
e
co
r
r
esp
o
n
d
in
g
o
f
f
s
et
d
e
f
in
ed
in
d
ec
i
m
a
l
an
d
h
e
x
ad
ec
i
m
al,
w
il
l
p
o
in
t
o
u
t
th
e
v
al
u
e
f
r
o
m
th
e
Sla
v
e
s
i
m
u
lato
r
.
Si
n
ce
th
e
v
alu
e
s
ar
e
b
ein
g
ex
tr
ac
ted
f
r
o
m
th
e
s
lav
e
a
s
a
n
in
p
u
t
f
o
r
t
h
e
m
a
s
ter
,
h
e
n
ce
t
h
e
I
/O
m
o
d
e
o
p
ted
w
ill
b
e
o
f
i
n
p
u
t
t
y
p
e.
T
h
e
s
e
tti
n
g
s
d
ef
i
n
ed
in
t
h
e
ato
m
m
ap
p
in
g
s
ec
tio
n
w
ill
b
e
r
ef
le
cted
in
th
e
an
a
lo
g
s
eg
m
e
n
t
o
f
th
e
o
b
j
ec
t
p
r
o
p
er
ties
[
2
1
]
.
On
ce
t
h
e
s
etti
n
g
s
ar
e
i
m
m
i
n
en
t
l
y
ca
r
r
ied
o
u
t,
t
h
e
i
n
d
iv
id
u
al
I
.
P
an
d
MA
C
ad
d
r
ess
es
ar
e
u
p
d
ated
as
in
d
i
ca
te
d
in
Fig
u
r
e
5
,
to
estab
lis
h
th
e
Ma
s
ter
s
i
m
u
lato
r
o
n
th
e
s
a
m
e
n
et
w
o
r
k
as t
h
e
P
L
C
s
i
m
u
lato
r
.
Fig
u
r
e
5
.
SC
A
D
A
-
HM
I
C
o
n
f
i
g
u
r
atio
n
o
n
t
h
e
f
ir
e
w
al
l
4
.
2
.
2
.
SCADA
-
H
M
I
(
a
t
t
a
ck
er
)
T
h
e
s
etu
p
f
o
r
t
h
e
at
t
ac
k
er
w
il
l
r
e
m
ain
t
h
e
s
a
m
e
as
t
h
e
m
a
s
ter
a
lo
n
g
w
it
h
d
i
s
ti
n
ct
I
P
ad
d
r
ess
.
T
h
e
d
ev
ice
Un
it
I
d
an
d
p
o
r
t
n
u
m
b
er
f
o
r
b
o
th
th
e
SC
AD
A
-
HM
I
(
Attack
er
an
d
Ma
s
te
r
)
an
d
Mo
d
s
i
m
6
4
s
i
m
u
lato
r
s
h
o
u
ld
al
w
a
y
s
r
e
m
a
in
t
h
e
s
a
m
e.
Fi
g
u
r
e
6
is
t
h
e
d
is
p
la
y
u
tili
ze
d
to
s
u
p
er
v
is
e
th
e
d
ata
f
lo
w
in
t
h
e
m
aster
a
n
d
as
w
ell
as t
h
e
attac
k
er
.
5.
P
RO
P
O
SE
D
M
E
T
H
O
DO
L
O
G
Y
AND
P
E
RF
O
RM
ANCE E
VA
L
UA
T
I
O
N
5
.
1
.
Wit
ho
ut
f
irew
a
ll scena
rio
Af
ter
s
et
tin
g
u
p
th
e
Slav
e,
M
aster
an
d
th
e
Attac
k
er
th
e
y
a
ll
n
ee
d
to
b
e
co
n
f
i
g
u
r
ed
to
a
p
ar
ticu
lar
r
an
g
e
o
f
I
P
.
B
ef
o
r
e
co
m
m
e
n
cin
g
th
e
s
ce
n
ar
io
,
test
t
h
e
p
i
n
g
b
et
w
ee
n
al
l
t
h
e
t
h
r
ee
s
y
s
te
m
s
r
esp
ec
tiv
e
l
y
.
T
h
is
en
s
u
r
es
a
s
tab
le
co
m
m
u
n
ica
tio
n
b
et
w
ee
n
th
e
s
y
s
te
m
s
an
d
co
n
n
ec
ti
n
g
s
w
itc
h
i
n
v
o
l
v
ed
.
A
n
o
f
f
s
e
t
d
ec
lar
ed
in
I
GSS
w
ill
b
e
ex
tr
ac
ted
f
r
o
m
Mo
d
b
u
s
s
i
m
u
la
to
r
.
T
h
is
d
ata
e
x
tr
ac
ted
w
ill
b
e
tr
an
s
m
itted
to
th
e
Ma
s
ter
an
d
Attack
er
S
C
ADA
-
HM
I
.
T
h
e
d
u
al
tr
an
s
m
is
s
io
n
o
f
d
ata
o
cc
u
r
s
d
u
e
to
a
b
s
en
ce
o
f
a
f
ir
e
w
all.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
2
,
A
p
r
il
2
0
2
0
:
1
3
5
9
-
136
6
1364
Hen
ce
,
allo
w
i
n
g
th
e
attac
k
er
ac
ce
s
s
to
t
h
e
Mo
d
b
u
s
s
i
m
u
l
ato
r
.
T
h
e
o
f
f
s
et
s
et
i
n
t
h
e
P
L
C
co
n
f
i
g
u
r
atio
n
i
s
o
r
ig
in
all
y
,
5
5
.
D
u
e
to
t
h
e
ab
s
en
ce
o
f
th
e
f
ir
e
w
all
in
t
h
is
s
ce
n
ar
io
,
th
e
o
r
i
g
i
n
al
r
ea
d
i
n
g
i
s
tr
a
n
s
f
er
r
ed
to
th
e
in
ter
f
ac
e,
w
h
ic
h
m
ak
e
s
it
ea
s
ier
f
o
r
th
e
h
ac
k
er
to
co
n
ce
iv
e
i
n
f
o
r
m
atio
n
f
r
o
m
.
Fig
u
r
e
6
d
is
p
lay
s
th
e
h
ac
k
er
’
s
s
cr
ee
n
,
b
ein
g
ab
l
e
to
o
b
tain
th
e
o
f
f
s
et
c
h
an
g
e
i
n
th
e
P
L
C
[
2
2
]
.
Fig
u
r
e
6
.
Hac
k
er
SC
A
D
A
-
H
MI
(
w
it
h
o
u
t
f
ir
e
w
all)
5
.
2
.
Wit
h
f
irew
a
ll scena
rio
I
n
th
is
s
ce
n
ar
io
a
f
ir
e
w
all
is
in
tr
o
d
u
ce
d
b
et
w
ee
n
th
e
Ma
s
t
er
an
d
th
e
s
lav
e
as
s
h
o
w
n
i
n
Fig
u
r
e
7
.
T
h
e
Net
1
p
o
r
t
o
f
th
e
f
ir
e
w
all
is
co
n
n
ec
ted
to
th
e
Ma
s
ter
S
C
A
D
A
-
HM
I
,
w
h
ile
t
h
e
Net
2
p
o
r
t
is
co
n
n
ec
ted
to
th
e
s
la
v
e
P
L
C
s
i
m
u
lato
r
.
T
h
e
r
e
m
ai
n
i
n
g
co
n
n
ec
tio
n
s
ta
y
s
t
h
e
s
a
m
e
a
s
th
e
w
it
h
o
u
t
f
ir
e
w
all
s
ce
n
ar
io
.
T
h
e
Fire
w
all
is
r
ea
d
y
to
u
s
e,
d
u
e
to
th
e
p
r
ev
io
u
s
l
y
d
ef
in
ed
ass
et
s
.
T
h
e
u
s
e
o
f
th
is
f
ir
e
w
a
ll
p
r
ev
en
t
s
th
e
attac
k
er
f
r
o
m
ac
ce
s
s
i
n
g
t
h
e
P
L
C
s
i
m
u
la
to
r
o
n
th
e
b
asi
s
o
f
a
s
ta
n
d
ar
d
p
r
o
t
o
co
l.
Fro
m
th
e
f
i
g
u
r
e,
d
u
e
to
th
e
p
r
ese
n
ce
o
f
t
h
e
f
ir
e
w
all,
i
s
s
elec
ti
v
el
y
r
u
lin
g
o
u
t t
h
e
h
ac
k
er
.
T
h
er
eb
y
,
o
b
s
c
u
r
in
g
th
e
o
r
ig
i
n
al
o
f
f
s
et
c
h
a
n
g
e
f
r
o
m
t
h
e
P
L
C
.
Fig
u
r
e
7
.
Hac
k
er
SC
A
D
A
-
H
MI
(
w
it
h
f
ir
e
w
al
l)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
u
g
men
ta
tio
n
o
f a
S
C
A
DA
b
a
s
ed
fir
ewa
ll a
g
a
in
s
t fo
r
eig
n
h
a
ck
in
g
d
ev
ices
(
A
b
h
is
h
ek
Mu
n
g
ek
a
r
)
1365
6.
RE
SU
L
T
S AN
D
CO
NC
L
U
S
I
O
N
T
h
is
p
ap
er
p
r
o
v
id
es
a
g
e
n
er
al
ized
in
s
i
g
h
t
o
n
t
h
e
r
eq
u
ir
e
m
e
n
t
o
f
f
ir
e
w
all
s
i
n
t
h
e
ca
s
e
o
f
I
n
d
u
s
tr
ial
co
n
tr
o
l
s
y
s
te
m
s
.
T
h
e
m
aj
o
r
s
u
r
v
eilla
n
ce
cr
iter
ia
’
s
h
a
v
e
b
ee
n
ad
d
r
ess
ed
,
f
o
llo
w
ed
b
y
p
r
o
v
id
in
g
a
s
tar
k
c
o
n
tr
ast
b
ee
n
an
I
T
an
d
an
I
n
d
u
s
tr
ial
f
ir
e
w
al
l.
T
h
e
ab
o
v
e
p
r
o
p
o
s
ed
i
d
ea
co
u
ld
ce
r
tain
l
y
p
r
o
v
e
u
s
e
f
u
l
in
m
aj
o
r
in
d
u
s
tr
ial
u
n
its
.
A
m
aj
o
r
p
o
in
t
th
at
s
h
o
u
ld
b
e
ta
k
e
n
i
n
to
co
n
s
id
er
atio
n
is
th
at,
th
er
e
i
s
n
o
s
u
c
h
c
u
s
to
m
ized
f
ir
e
w
all
p
r
esen
t
i
n
t
h
e
m
ar
k
e
t
to
tail
o
r
all
t
h
e
s
ec
u
r
it
y
p
r
o
t
o
co
ls
.
Mo
r
eo
v
er
,
as
c
y
b
er
-
att
ac
k
s
g
et
m
o
r
e
a
n
d
m
o
r
e
f
atal,
r
eg
u
lar
l
y
u
p
d
ati
n
g
th
ese
p
r
e
-
d
e
f
in
ed
p
r
o
to
co
ls
is
cr
u
cial
[
2
3
]
.
T
h
e
id
ea
p
r
o
p
o
s
ed
ab
o
v
e
is
o
n
e
o
u
t
o
f
m
a
n
y
,
i
n
t
h
e
f
ield
o
f
C
y
b
er
s
ec
u
r
it
y
o
f
co
n
tr
o
l s
y
s
te
m
s
.
A
t
th
e
m
o
m
en
t
en
co
d
in
g
w
i
th
t
h
e
h
elp
o
f
M
A
C
an
d
I
.
P
ad
d
r
ess
es
i
s
a
v
er
y
u
n
iq
u
e
w
a
y
o
f
tack
li
n
g
e
x
ter
n
al
tr
af
f
ic
w
it
h
in
t
h
e
n
et
w
o
r
k
.
Mo
r
e
s
o
p
h
is
ticated
m
et
h
o
d
s
o
f
en
co
d
in
g
ca
n
b
e
d
ev
elo
p
ed
to
ass
u
r
e
ev
en
h
ig
h
er
lev
el
o
f
s
ec
u
r
it
y
[
2
4
,
2
5
]
.
W
o
r
k
in
g
s
ce
n
ar
io
w
it
h
all
t
h
r
ee
d
ev
ices c
o
n
n
ec
t
ed
to
o
n
e
s
in
g
le
n
et
w
o
r
k
a
s
s
h
o
w
n
in
F
ig
u
r
e
8
.
Fig
u
r
e
8
.
W
o
r
k
in
g
s
ce
n
ar
io
,
w
ith
all
t
h
r
ee
d
ev
ices c
o
n
n
ec
ted
to
o
n
e
s
in
g
le
n
et
w
o
r
k
RE
F
E
R
E
NC
E
S
[1
]
Ca
rd
e
n
a
s,
A
.
A
.
,
Am
in
,
S
.
,
A
n
d
S
a
stry
,
S
.
,
”
S
e
c
u
re
c
o
n
tro
l:
T
o
w
a
rd
s
su
rv
i
v
a
b
le
c
y
b
e
r
-
p
h
y
sic
a
l
s
y
st
e
m
s”
,
In
Pro
c
e
e
d
in
g
s
o
f
t
h
e
Fi
rs
t
I
n
ter
n
a
ti
o
n
a
l
W
o
rk
sh
o
p
o
n
Cy
b
e
r
-
P
h
y
sic
a
l
S
y
ste
ms
.
(Ju
n
e
2
0
0
8
).
[2
]
Ch
e
u
n
g
,
S
.
,
Du
tertre
,
B.
,
F
o
n
g
,
M
.
,
L
in
d
q
u
ist,
U.,
S
k
in
n
e
r,
K.,
a
n
d
V
a
ld
e
s,
A
.
“
Us
in
g
m
o
d
e
l
-
b
a
se
d
in
tr
u
sio
n
d
e
tec
ti
o
n
f
o
r
S
CA
D
A
n
e
tw
o
rk
s
”
,
In
Pro
c
e
e
d
in
g
s
o
f
t
h
e
S
CADA
S
e
c
u
rity
S
c
ien
ti
fi
c
S
y
mp
o
siu
m
(
M
i
a
m
i
Be
a
c
h
,
F
L
,
USA
,
2
0
0
7
.
[3
]
G
a
o
,
“
In
f
o
r
m
a
ti
o
n
se
c
u
rit
y
,
T
V
A
n
e
e
d
s
to
a
d
d
re
ss
w
e
a
k
n
e
ss
e
s
i
n
c
o
n
tr
o
l
sy
ste
m
s
a
n
d
n
e
tw
o
rk
s”
,
T
e
c
h
.
Rep
.
GAO
-
08
-
5
2
6
,
Rep
o
rt t
o
Co
n
g
re
ss
io
n
a
l
Req
u
e
ste
rs
,
M
a
y
2
0
0
8
.
[4
]
M
a
rsc
h
a
ll
A
b
ra
m
s
a
n
d
Jo
e
W
e
i
ss
,
“
M
a
li
c
io
u
s
Co
n
tro
l
S
y
ste
m
C
y
b
e
r
S
e
c
u
rit
y
A
tt
a
c
k
C
a
se
S
tu
d
y
–
M
a
ro
o
c
h
y
W
a
ter S
e
rv
i
c
e
s,
A
u
stra
li
a
”
,
Bo
sto
n
.
[5
]
Jo
h
n
H.
M
a
rb
u
g
e
r,
I.
,
a
n
d
Kv
a
m
m
e
,
E.
F
,
“
L
e
a
d
e
rsh
ip
u
n
d
e
r
c
h
a
ll
e
n
g
e
:
In
f
o
r
m
a
ti
o
n
tec
h
n
o
l
o
g
y
R
&
D
in
a
c
o
m
p
e
ti
ti
v
e
w
o
rld
.
A
n
a
s
se
ss
m
e
n
t
o
f
th
e
f
e
d
e
ra
l
n
e
t
w
o
rk
in
g
a
n
d
in
f
o
rm
a
ti
o
n
tec
h
n
o
lo
g
y
R&
D
p
ro
g
ra
m
.
”
T
e
c
h
.
re
p
.
,
Pr
e
sid
e
n
t’s
C
o
u
n
c
il
o
f
A
d
v
iso
rs
o
n
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
lo
g
y
,
A
u
g
u
st 2
0
0
7
.
[6
]
S
to
u
f
f
e
r,
K.,
F
a
lco
,
J.
,
a
n
d
Ke
n
t,
K,
“
G
u
id
e
t
o
su
p
e
rv
iso
ry
c
o
n
tro
l
a
n
d
d
a
ta
a
c
q
u
isit
io
n
(sc
a
d
a
)
a
n
d
in
d
u
stria
l
c
o
n
tro
l
sy
ste
m
s se
c
u
rit
y
”
.
S
p
8
0
0
-
8
2
,
NI
S
T
,
S
e
p
tem
b
e
r
2
0
0
6
.
[7
]
US
-
CERT
,
“
Co
n
tr
o
l
S
y
ste
m
s
S
e
c
u
rit
y
P
ro
g
ra
m
.
U
S
De
p
a
rtm
e
n
t
o
f
Ho
m
e
l
a
n
d
S
e
c
u
ri
ty
”
,
h
tt
p
:
//
ww
w
.
u
sc
e
rt.
g
o
v
/co
n
tro
l
sy
s
tem
s/in
d
e
x
.
h
tm
l,
2
0
0
8
.
[8
]
L
u
ii
jf
,
H.A
.
M
.
,
“
P
r
o
c
e
ss
Co
n
tr
o
l
S
e
c
u
rit
y
in
t
h
e
Cy
b
e
rc
ri
m
e
In
f
o
r
m
a
ti
o
n
Ex
c
h
a
n
g
e
”
,
NICC,
T
h
e
Ha
g
u
e
,
t
h
e
Ne
th
e
rlan
d
s
,
2
0
1
0
.
[9
]
NCSC
,
“
Ch
e
c
k
li
st
S
e
c
u
rit
y
o
f
I
CS
/S
CA
D
A
s
y
ste
m
s”
,
f
a
c
tsh
e
e
t
2
0
1
2
-
0
2
,
M
in
istry
o
f
S
e
c
u
rit
y
a
n
d
Ju
st
ice
,
T
h
e
Ha
g
u
e
,
T
h
e
Ne
th
e
rlan
d
s,
2
0
1
2
.
[1
0
]
MSB
,
“
G
u
id
e
t
o
i
n
c
re
a
se
d
se
c
u
rit
y
in
in
d
u
strial
in
f
o
rm
a
ti
o
n
a
n
d
c
o
n
tr
o
l
sy
ste
m
s”
,
S
we
d
ish
Civil
Co
n
ti
n
g
e
n
c
ies
Ag
e
n
c
y
,
S
t
o
c
k
h
o
lm
,
S
w
e
d
e
n
,
2
0
1
4
.
[1
1
]
M
.
Oo
ste
rin
k
,
“
S
e
c
u
rit
y
o
f
leg
a
c
y
p
ro
c
e
ss
c
o
n
tro
l
sy
ste
m
s:
m
o
v
in
g
to
w
a
rd
s
se
c
u
re
p
ro
c
e
ss
c
o
n
tro
l
sy
ste
m
s”
(w
h
it
e
p
a
p
e
r),
T
h
e
Ha
g
u
e
,
T
h
e
Ne
th
e
rlan
d
s,
2
0
1
2
.
[1
2
]
Hu
rd
,
S
.
,
S
m
it
h
,
R.
,
A
N
D
L
e
isc
h
n
e
r,
G
.
“
T
u
to
rial:
S
e
c
u
rit
y
in
e
lec
tri
c
u
ti
li
ty
Co
n
tro
l
s
y
s
te
m
s
”
.
In
6
1
st
An
n
u
a
l
Co
n
fer
e
n
c
e
fo
r P
r
o
tec
ti
v
e
Rela
y
En
g
i
n
e
e
rs
(
Ap
ril
2
0
0
8
)
,
p
p
.
3
0
4
–
309
,
2
0
0
8
.
[1
3
]
S
tew
a
rt
A
.
Bo
y
e
r,
"
S
C
A
D
A
:
S
u
p
e
rv
iso
r
y
Co
n
tro
l
a
n
d
Da
ta A
c
q
u
is
it
io
n
"
,
I
n
ter
n
a
ti
o
n
a
l
S
o
c
iety
o
f
Au
to
ma
ti
o
n
2
0
0
9
.
[1
4
]
G
re
g
o
r
y
K.
M
c
M
il
lan
,
"
P
ro
c
e
ss
/I
n
d
u
str
ial
In
str
u
m
e
n
ts an
d
c
o
n
tro
ls
Ha
n
d
b
o
o
k
"
M
c
G
r
AW
-
HI
L
1
9
9
9
.
[1
5
]
J.
V
ieg
a
a
n
d
M
.
M
e
ss
ier,
“
S
e
c
u
rit
y
is h
a
rd
e
r
th
a
n
y
o
u
th
i
n
k
,
”
AC
M
Qu
e
u
e
,
v
o
l.
2
,
p
p
.
6
0
–
6
5
,
Ju
l
/A
u
g
.
2
0
0
4
.
[1
6
]
T
id
re
a
,
A
le
x
a
n
d
ra
&
Ko
ro
d
i,
Ad
rian
.
(2
0
1
8
).
W
e
b
Na
v
I
G
S
S
Web
-
Ba
se
d
S
o
f
t
w
a
re
S
o
lu
ti
o
n
f
o
r
I
G
S
S
S
CAD
A
A
p
p
li
c
a
ti
o
n
s.
4
1
8
-
4
2
3
.
1
0
.
1
1
0
9
/
M
ED.
2
0
1
8
.
8
4
4
2
5
6
0
[1
7
]
Ke
it
h
S
to
u
f
ler,
S
u
sa
n
L
ig
h
tm
a
n
,
M
a
rsh
a
l
A
b
ra
m
s,
"
G
u
id
e
to
in
d
u
strial
c
o
n
tr
o
l
sy
st
e
m
s
S
e
c
u
rit
y
"
,
NIS
T
sp
e
c
ia
l
p
u
b
li
c
a
ti
o
n
,
pp
.
8
0
0
–
8
2
,
M
a
y
2
0
1
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
2
,
A
p
r
il
2
0
2
0
:
1
3
5
9
-
136
6
1366
[1
8
]
K.
M
c
M
il
lan
G
re
g
o
r
y
,
"
P
ro
c
e
ss
/In
d
u
str
ial
In
str
u
m
e
n
ts an
d
c
o
n
tro
ls
Ha
n
d
b
o
o
k
"
in
,
M
c
G
rAW
-
HI
L
,
1
9
9
9
.
[1
9
]
P
a
u
l
Did
ier,
"
Re
f
e
r
e
n
c
e
A
rc
h
it
e
c
tu
re
s
f
o
r
In
d
u
strial
A
u
to
m
a
ti
o
n
a
n
d
Co
n
tro
l
S
y
ste
m
s
"
,
OD
VA
In
d
u
stry
Co
n
fer
e
n
c
e
&
1
5
th
An
n
u
a
l
M
e
e
ti
n
g
,
Oc
to
b
e
r
2
0
1
2
.
[2
0
]
M
.
J.
Ka
ra
m
,
F
.
A
.
T
o
b
a
g
i,
"
A
n
a
l
y
sis
o
f
th
e
d
e
lay
a
n
d
ji
tt
e
r
o
f
v
o
ice
traff
ic
o
v
e
r
th
e
In
tern
e
t
i
n
"
,
Pro
c
.
o
f
IEE
E
INFOCOM
′
0
1
,
2
0
0
1
.
[2
1
]
P
.
Ne
u
m
a
n
n
,
"
Co
m
m
u
n
ica
ti
o
n
i
n
in
d
u
strial
a
u
to
m
a
ti
o
n
-
w
h
a
t
is
g
o
in
g
o
n
"
i
n
Co
n
tro
l
En
g
in
e
e
rin
g
Pra
c
ti
c
e
,
El
se
v
ier L
td
,
v
o
l.
1
5
,
p
p
.
1
3
3
2
-
1
3
4
7
,
2
0
0
6
.
[2
2
]
D.
D
z
u
n
g
,
M
.
Na
e
d
e
le,
Ho
ff
T
.
P
.
Vo
n
,
M
.
Cre
v
a
ti
n
,
"
S
e
c
u
rit
y
f
o
r
In
d
u
strial
Co
m
m
u
n
ica
ti
o
n
S
y
ste
m
s
"
,
Pro
c
e
e
d
in
g
s
o
f
T
h
e
IEE
E
,
v
o
l.
9
3
,
n
o
.
6
,
JU
NE
2
0
0
5
.
[2
3
]
S
tan
d
a
rd
s
f
o
r
S
e
c
u
rit
y
Ca
teg
o
riza
ti
o
n
o
f
F
e
d
e
ra
l
In
f
o
rm
a
ti
o
n
a
n
d
I
n
f
o
rm
a
ti
o
n
S
y
ste
m
s
N
a
ti
o
n
a
l
In
stit
u
te
f
o
r
S
tan
d
a
rd
s a
n
d
T
e
c
h
n
o
lo
g
y
F
IP
S
1
9
9
,
F
e
b
ru
a
ry
2
0
0
4
.
[2
4
]
"
M
in
im
u
m
S
e
c
u
rit
y
Re
q
u
ire
m
e
n
ts
f
o
r
F
e
d
e
ra
l
In
f
o
r
m
a
ti
o
n
a
n
d
In
f
o
rm
a
ti
o
n
S
y
ste
m
s
Na
ti
o
n
a
l
In
stit
u
te
f
o
r
S
tan
d
a
rd
s
a
n
d
T
e
c
h
n
o
lo
g
y
F
IP
S
2
0
0
"
,
F
ra
m
e
w
o
rk
f
o
r
I
m
p
ro
v
in
g
Crit
ica
l
In
f
ra
stru
c
tu
re
C
y
b
e
rse
c
u
rit
y
.
NIST
F
e
b
ru
a
ry
2
0
1
4
,
M
a
rc
h
2
0
0
6
.
[2
5
]
M
.
B.
L
in
e
,
I.
A
.
T
o
n
d
e
l,
M
.
G
.
J
a
a
tu
n
,
"
C
y
b
e
r
se
c
u
rit
y
c
h
a
ll
e
n
g
e
s
in
S
m
a
rt
G
rid
s"
,
In
n
o
v
a
ti
v
e
S
ma
rt
Gr
id
T
e
c
h
n
o
l
o
g
ies
(
IS
GT
Eu
ro
p
e
)
2
0
1
1
2
n
d
IEE
E
P
ES
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
a
n
d
Exh
i
b
it
i
o
n
o
n
,
p
p
.
1
-
8
,
2
0
1
1
.
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
Abh
ish
e
k
A
n
il
M
u
n
g
e
k
a
r
is
c
u
rre
n
tl
y
p
u
rsu
in
g
Ba
c
h
e
lo
r
o
f
E
n
g
in
e
e
rin
g
w
it
h
Ho
n
o
rs
i
n
El
e
c
tro
n
ics
a
n
d
In
str
u
m
e
n
tatio
n
En
g
in
e
e
rin
g
in
B
it
s
P
il
a
n
i
Du
b
a
i
Ca
m
p
u
s.
His
a
re
a
o
f
in
tere
st
is Cy
b
e
rs
e
c
u
rit
y
,
S
y
st
e
m
s Co
n
tro
l
&
In
stru
m
e
n
tatio
n
Ya
s
h
r
a
j
K
a
l
p
e
s
h
S
o
la
n
k
i
is
c
u
rre
n
tl
y
p
u
rsu
i
n
g
Ba
c
h
e
lo
r
o
f
En
g
in
e
e
rin
g
w
it
h
Ho
n
o
rs
i
n
El
e
c
tro
n
ics
a
n
d
In
str
u
m
e
n
tatio
n
En
g
in
e
e
rin
g
in
B
it
s
P
il
a
n
i
Du
b
a
i
Ca
m
p
u
s.
His
a
re
a
o
f
in
tere
st
is Cy
b
e
rs
e
c
u
rit
y
,
A
u
to
m
a
ti
o
n
&
I
n
stru
m
e
n
tatio
n
.
Dr
.
R
.
S
w
a
r
n
a
la
t
h
a
d
id
h
e
r
BE
in
In
stru
m
e
n
tatio
n
&
Co
n
tro
l
E
n
g
in
e
e
rin
g
f
ro
m
S
a
th
a
y
a
b
a
m
a
En
g
in
e
e
rin
g
Co
ll
e
g
e
,
Ch
e
n
n
a
i
a
n
d
M
.
E
in
I
n
stru
m
e
n
tatio
n
En
g
in
e
e
rin
g
f
ro
m
M
a
d
ra
s
In
stit
u
te
o
f
T
e
c
h
n
o
l
o
g
y
,
A
n
n
a
Un
iv
e
rsity
,
Ch
e
n
n
a
i.
S
h
e
re
c
e
iv
e
d
h
e
r
P
h
D
d
e
g
re
e
in
Bio
m
e
d
ica
l
In
stru
m
e
n
tati
o
n
f
ro
m
Birl
a
In
stit
u
te
o
f
T
e
c
h
n
o
lo
g
y
a
n
d
S
c
ien
c
e
(BIT
S
),
P
il
a
n
i,
I
n
d
ia.
S
h
e
h
a
s
2
0
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
S
h
e
is
w
o
rk
in
g
w
it
h
BIT
S
P
i
lan
i,
Du
b
a
i
Ca
m
p
u
s
f
o
r
p
a
st
1
4
y
e
a
rs.
S
h
e
h
a
s
g
u
id
e
d
m
a
n
y
p
ro
jec
ts
a
n
d
tau
g
h
t
v
a
rio
u
s
c
o
u
r
se
s
f
o
r
u
n
d
e
rg
ra
d
u
a
te
a
n
d
p
o
stg
ra
d
u
a
te
stu
d
e
n
ts.
He
r
re
se
a
rc
h
in
tere
st
in
c
lu
d
e
s
b
i
o
m
e
d
ic
a
l
in
stru
m
e
n
tatio
n
,
p
r
o
c
e
ss
c
o
n
tro
l
&
In
str
u
m
e
n
tatio
n
,
n
e
u
ra
l
n
e
tw
o
rk
&
f
u
z
z
y
lo
g
ic.
Evaluation Warning : The document was created with Spire.PDF for Python.