Jan 09, 2024 · Secure IIoT Systems
Secure IIoT Transport and Segmentation Controls: Byzantine Compromise Assumptions and Recovery Paths
A formal engineering analysis of secure iiot systems with emphasis on byzantine compromise assumptions and recovery paths and adversarial operational constraints.
11 minRead Article