An Industrial Control System (ICS) adversary often takes different actions to exploit vulnerabilities, pass the border between Information Technology (IT) and Operational (OT) networks, launch a targeted attack against OT networks. Detecting these threat in early phases before final stage of attacks can be executed industrial endpoints help prevent adversaries from achieving their goals. Threat...