Fig. 4From: Deriving invariant checkers for critical infrastructure using axiomatic design principlesEquation characterising the second-level information-state couplingsBack to article page