ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
Critical Information Infrastructures Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-93200-8_6
◽
2021
◽
pp. 99-115
Author(s):
Mihael Marović
◽
Ante Derek
◽
Stjepan Groš
Keyword(s):
Formal Methods
◽
Scada Systems
Download Full-text
Related Documents
Cited By
References
Application of formal methods to the VIPER microprocessor
IEE Proceedings E Computers and Digital Techniques
◽
10.1049/ip-e.1987.0023
◽
1987
◽
Vol 134
(3)
◽
pp. 133
◽
Cited By ~ 7
Author(s):
W.J. Cullyer
◽
C.H. Pygott
Keyword(s):
Formal Methods
Download Full-text
Constraint Analysis of System Requirement in SysML with Formal Methods
IEEJ Transactions on Electronics Information and Systems
◽
10.1541/ieejeiss.137.809
◽
2017
◽
Vol 137
(6)
◽
pp. 809-814
Author(s):
Yosuke Kakiuchi
Keyword(s):
Formal Methods
◽
Constraint Analysis
◽
System Requirement
Download Full-text
DATA EXCHANGE ORGANIZATION IN SCADA-SYSTEMS BASED ON STANDARD OPEN COMMUNICATION PROTOCOLS
RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics
◽
10.28995/2686-679x-2019-1-8-20
◽
2019
◽
pp. 8-20
Author(s):
Galina S. Ivanova
◽
◽
Maxim V. Bäcker
◽
Keyword(s):
Data Exchange
◽
Communication Protocols
◽
Open Communication
◽
Scada Systems
Download Full-text
Increasing the Practical Impact of Formal Methods for Computer-Aided Software Development,
10.21236/ada310438
◽
1995
◽
Cited By ~ 3
Author(s):
Luqi
Keyword(s):
Software Development
◽
Formal Methods
◽
Computer Aided
◽
Practical Impact
Download Full-text
A Prototype Formal Methods Environment
10.21236/ada389751
◽
2001
◽
Author(s):
Ray Teitelbaum
Keyword(s):
Formal Methods
Download Full-text
Applying Practical Formal Methods to the Specifications and Analysis of Security Properties
10.21236/ada464842
◽
2001
◽
Cited By ~ 2
Author(s):
Constance Heitmeyer
Keyword(s):
Formal Methods
◽
Security Properties
Download Full-text
A Proposal for a Taxonomy for Vulnerabilities in Supervisory Control and Data Acquisition (SCADA) Systems
10.21236/ada609797
◽
2014
◽
Author(s):
Sidney C. Smith
Keyword(s):
Data Acquisition
◽
Supervisory Control
◽
Scada Systems
Download Full-text
Formal Methods for Reverse Engineering Gate-Level Netlists
10.21236/ada623698
◽
2013
◽
Cited By ~ 4
Author(s):
Wenchao Li
Keyword(s):
Reverse Engineering
◽
Formal Methods
Download Full-text
Practical Formal Methods for Hardware Design
10.1007/978-3-642-60641-0
◽
1997
◽
Cited By ~ 2
Keyword(s):
Formal Methods
◽
Hardware Design
Download Full-text
Risk assessment methods for converged IoT and SCADA systems: review and recommendations
Living in the Internet of Things (IoT 2019)
◽
10.1049/cp.2019.0130
◽
2019
◽
Author(s):
R. Aldmour
◽
P. Burnap
◽
M. Lakoju
Keyword(s):
Risk Assessment
◽
Assessment Methods
◽
Scada Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close