Any vulnerability in this hardware and software can lead to corresponding cyberattacks [28]. These devices include: Field devices I/O, such as pump, sensor, fan, valve; Control level, such as HMI, RTU; Process level, such as HMI, SCADA server; Operation workstation, various servers, such...