Fig. 2From: Abstracts of the 11th DACH+ Conference on Energy InformaticsUser interface of the implemented IDS (left), supervising the testbed and the attack tool (right)Back to article page