Methodology for Detecting Attacks in the Context of Destructive Influences | IEEE Conference Publication | IEEE Xplore