Return to Article Details Methods and algorithms for the implementation of security monitoring in computer networks of automated process control systems. Download Download PDF