Digital Forensics Process of an Attack Vector in ICS environment | IEEE Conference Publication | IEEE Xplore