Analyzing Threat Vectors in ICS Cyberattacks | IEEE Conference Publication | IEEE Xplore