Man-in-the-Middle Attack Against a Network Control System: Practical Implementation and Detection | IEEE Conference Publication | IEEE Xplore