Fig. 3From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesHigh-level overview of our design-level analysis for obtaining invariant checkersBack to article page