How to Fingerprint Attack Traffic against Industrial Control System Network | IEEE Conference Publication | IEEE Xplore