Fig. 1From: Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocolProtocol stack with IEC 60870-5-104 according to (Matoušek 2017)Back to article page