Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks | IEEE Journals & Magazine | IEEE Xplore