“…Other work has proposed techniques to perform live forensics, i.e., investigate potential attacks while the system is running ( Al-Sharif et al, 2018;Taveras, 2013 ). In addition, several approaches have focused on analysing and acquiring evidence from specific ICS devices, namely PLC's ( Chan et al, 2018;Qasim et al, 2020;Yau et al, 2018 ) and engineering workstations ( Hadz ȋosmanovi ć et al, 2012;Myers et al, 2017 ).…”