Exploring Hardware Vulnerabilities in Robotic Actuators: A Case of Man-in-the-Middle Attacks | Publicación