The security of these systems requires stringent vigilance to identify vulnerabilities and deter unauthorized access to digital control systems that may result in compromised safety or security ...