Fig. 8From: Research on trusted DNP3-BAE protocol based on hash chainAttacker knowledge and security goalsBack to article page