[1]
F. Obeid and P. Dhaussy, “Formal Verification of Security Pattern Composition: Application to SCADA”, Comput. Inform., vol. 38, no. 5, pp. 1149–1180, Feb. 2020.