From: Deriving invariant checkers for critical infrastructure using axiomatic design principles
LIT-301 | MV-201 | P-101 | P-102 | yk |
---|---|---|---|---|
1 | 1 | 1 | 1 | 1 (normal) |
1 | 1 | 2 | 1 | 1 (normal) |
1 | 1 | 2 | 2 | 1 (normal) |
1 | 2 | 1 | 1 | 1 (normal) |
1 | 2 | 1 | 2 | 2 (anomaly) |
1 | 2 | 2 | 1 | 2 (anomaly) |
1 | 2 | 2 | 2 | 3 (normal) |
2 | 1 | 1 | 1 | 4 (anomaly) |
2 | 1 | 1 | 2 | 5 (normal) |
2 | 1 | 2 | 1 | 5 (normal) |
2 | 1 | 2 | 2 | 5 (normal) |
2 | 2 | 1 | 1 | 5 (normal) |
2 | 2 | 2 | 2 | 5 (normal) |