This research presents a systematic security analysis that we performed to explore a variety of attack vectors on
a real smart manufacturing system and to assess the attacks that could be feasibly launched on a complex smart
manufacturing system. The main, two-pronged question we want to answer is: Under which threat conditions
and attacker capabilities are certain attacks possible, and what are the consequences?
Please complete the form below to download…