Trust but Verify Critical Infrastructure Cyber Security Solutions | IEEE Conference Publication | IEEE Xplore