Using a packet manipulation tool for security analysis of industrial network protocols | IEEE Conference Publication | IEEE Xplore