Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code FilesC. Beckwith, H.S. Naicker, S. Mehta, V.R. Udupa, N.T. Nim, V. Gadre, H. Pearce, G. Mac, N. GuptaJan 1, 2021DOI URL