Detection of Vulnerabilities in the Perimeter of the ICS Network Infrastructure Using TCP/IP Protocols | IEEE Conference Publication | IEEE Xplore