no code implementations • 29 Apr 2023 • Ankush Meshram, Markus Karch, Christian Haas, Jürgen Beyerer
It successfully detects and reports the anomalies triggered by a network attack in a miniaturized PROFINET-based industrial system, executed through valid network protocol exchanges and resulting in invalid PROFINET operation transition for the device.