Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques | IEEE Conference Publication | IEEE Xplore