|
Volumn 2, Issue , 2005, Pages 392-397
|
Correctness proofs for SCADA communication protocols
|
Author keywords
Communication protocols; Communications security; Correctness proof; Formal analysis; Protocol security; SCADA networks
|
Indexed keywords
COMMUNICATIONS PROTOCOLS;
COMMUNICATIONS SECURITY;
CORRECTNESS PROOFS;
EXISTING SYSTEMS;
FORMAL ANALYSIS;
INITIAL DESIGN;
PROTOCOL SECURITY;
SECURITY CONSIDERATIONS;
SECURITY ENHANCEMENTS;
SUPERVISORY CONTROL AND DATA ACQUISITION;
VERIFICATION METHOD;
COMPUTER CRIME;
CRITICAL INFRASTRUCTURES;
INFORMATION SCIENCE;
NETWORK PROTOCOLS;
CYBERNETICS;
|
EID: 36249003846
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (8)
|
References (18)
|