Examining the Cyber Security of a Real World Access Control Implementation | IEEE Conference Publication | IEEE Xplore