Return to Article Details An approach to identifying threats of extracting confidential data from automated control systems based on internet technologies Download Download PDF