-
1
-
-
7244223259
-
-
D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste, Rainbow: Architecture-based self-adaptation with reusable infrastruc ture IEEE Computer, 37, Issue 10, pp. 46-54, October 2004.
-
D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste, "Rainbow: Architecture-based self-adaptation with reusable infrastruc ture" IEEE Computer, vol. Volume 37, Issue 10, pp. 46-54, October 2004.
-
-
-
-
2
-
-
0141538160
-
Model-based adaptation for self-healing systems
-
New York, NY, USA
-
D. Garlan and B. Schmerl, "Model-based adaptation for self-healing systems" in WOSS '02: Proceedings of the first workshop on Self-healing systems, New York, NY, USA, 2002, pp. 27-32.
-
(2002)
WOSS '02: Proceedings of the first workshop on Self-healing systems
, pp. 27-32
-
-
Garlan, D.1
Schmerl, B.2
-
3
-
-
35248861664
-
An approach to self-adaptive software based on supervisory control
-
G. Karsai, Á. Lédeczi, J. Sztipanovits, G. Péceli, G. Simon, and T. Kovácsházy, "An approach to self-adaptive software based on supervisory control" in IWSAS, 2001, pp. 24-38.
-
(2001)
IWSAS
, pp. 24-38
-
-
Karsai, G.1
Lédeczi, A.2
Sztipanovits, J.3
Péceli, G.4
Simon, G.5
Kovácsházy, T.6
-
5
-
-
38049094272
-
A framework for dynamic software architecture-based self-healing
-
Y. Qun, Y. Xian-Chun, and X. Man-Wu, "A framework for dynamic software architecture-based self-healing" SIGSOFT Softw. Eng. Notes, vol. 30, no. 4, pp. 1-4, 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.4
, pp. 1-4
-
-
Qun, Y.1
Xian-Chun, Y.2
Man-Wu, X.3
-
6
-
-
28344439536
-
Self-managing systems: A control theory foundation
-
Y. Diao, J. Hellerstein, S. Parekh, R. Griffith, G. Kaiser, and D. Phung, "Self-managing systems: A control theory foundation" in 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS '05), 2005.
-
(2005)
12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS '05)
-
-
Diao, Y.1
Hellerstein, J.2
Parekh, S.3
Griffith, R.4
Kaiser, G.5
Phung, D.6
-
7
-
-
50249088639
-
Friedman-Hill
-
S. N. L. Ernest Friedman-Hill, "Jess" http://herzberg.ca. sandia.gov/jess/.
-
Jess
-
-
Ernest, S.N.L.1
-
8
-
-
36249008579
-
Critical Infrastructure Protection Challenges and Efforts to Secure Control Systems
-
United States General Accounting Office, March
-
United States General Accounting Office. Critical Infrastructure Protection Challenges and Efforts to Secure Control Systems. Report to Congressional Requesters. March 2004.
-
(2004)
Report to Congressional Requesters
-
-
-
9
-
-
49049116201
-
-
Understanding SCADA Security Vulnerabilities. Technical Report. Riptech, Inc. 2001.
-
Understanding SCADA Security Vulnerabilities. Technical Report. Riptech, Inc. 2001.
-
-
-
-
10
-
-
49049116792
-
-
J. Pollet. Developing a Solid SCADA Security Strategy. SICON. Houston. TX. 2002.
-
J. Pollet. Developing a Solid SCADA Security Strategy. SICON. Houston. TX. 2002.
-
-
-
-
11
-
-
49049118119
-
-
F. Haji. L. Lindsay. S. Song. Practical Security Strategy for SCADA Automation Systems and Networks. CCECE/CCGEI, Saskatoon. May 2005.
-
F. Haji. L. Lindsay. S. Song. Practical Security Strategy for SCADA Automation Systems and Networks. CCECE/CCGEI, Saskatoon. May 2005.
-
-
-
-
12
-
-
33745471659
-
-
C. L. Bowen. T. K. Buennemeyer. R. W. Thomas. Next Generation SCADA Security: Best Practices and Client Puzzles. In Proceedings of the IEEE Workshop on Information Assurance and Security. West Point, NY. 2005.
-
C. L. Bowen. T. K. Buennemeyer. R. W. Thomas. Next Generation SCADA Security: Best Practices and Client Puzzles. In Proceedings of the IEEE Workshop on Information Assurance and Security. West Point, NY. 2005.
-
-
-
-
13
-
-
38549133118
-
Dependable Computing Systems: Paradigins
-
Wiley, Inc
-
D. Gamez. S. N. Tehrani. J. Bigham. C. Balducelli. K. Burbeck. T. Chyssler. Dependable Computing Systems: Paradigins. Performance Issues, and Applications. Wiley, Inc. 2000.
-
(2000)
Performance Issues, and Applications
-
-
Gamez, D.1
Tehrani, S.N.2
Bigham, J.3
Balducelli, C.4
Burbeck, K.5
Chyssler, T.6
-
14
-
-
49049085335
-
-
InTech Inc. Intrusion Detection and Cybersecurity. Technical Report. May
-
InTech Inc. Intrusion Detection and Cybersecurity. Technical Report. May 2004.
-
(2004)
-
-
-
15
-
-
24244456763
-
-
Ph.D. dissertation, Department of Computer Science, University of Virginia, Charlottesville, VA
-
Wika. K.J., Safety Kernel Enforcement of Software Safety Policies, Ph.D. dissertation, Department of Computer Science, University of Virginia, Charlottesville, VA, 1995.
-
(1995)
Safety Kernel Enforcement of Software Safety Policies
-
-
Wika, K.J.1
-
16
-
-
38549119632
-
Safety Design Requirements and Guidelines for Munition Related Safety Critical Computing Systems
-
NATO AC/310 Ad Hoc Working Group on Munition Related Safety Critical Computing Systems, Draft, March
-
NATO AC/310 Ad Hoc Working Group on Munition Related Safety Critical Computing Systems, "Safety Design Requirements and Guidelines for Munition Related Safety Critical Computing Systems," NATO Standardization Agreement (STANAG) 4404 (Draft), March 1990.
-
(1990)
NATO Standardization Agreement (STANAG)
, pp. 4404
-
-
-
17
-
-
18244376230
-
Software test techniques for system fault-tree analysis
-
Knight J. C. Nakano L. G. Software test techniques for system fault-tree analysis. In Proc. SAFECOMP 97, 1997, pp. 369-380
-
(1997)
In Proc. SAFECOMP
, vol.97
, pp. 369-380
-
-
Knight, J.C.1
Nakano, L.G.2
-
18
-
-
0020632968
-
Design for Safe Software
-
Reno, Nevada
-
Leveson, N. G., T. J. Shimeall, J. L. Stolzy, and J. C. Thomas, "Design for Safe Software" in Proceedings AIAA Space Sciences Meeting, Reno, Nevada, 1983.
-
(1983)
Proceedings AIAA Space Sciences Meeting
-
-
Leveson, N.G.1
Shimeall, T.J.2
Stolzy, J.L.3
Thomas, J.C.4
-
19
-
-
49049097770
-
-
Wayne Labs. Technology Brief (Issue 2, 2004). How secure is your control system? http://www.automationnotebook.com/2004_Issue_2/ technologybrief_September2004.html
-
Wayne Labs. Technology Brief (Issue 2, 2004). How secure is your control system? http://www.automationnotebook.com/2004_Issue_2/ technologybrief_September2004.html
-
-
-
-
20
-
-
49049118335
-
-
NUREG-0492, Fault Tree Handbook, U.S. Nuclear Regulatory Commission, January, 1981.
-
NUREG-0492, Fault Tree Handbook, U.S. Nuclear Regulatory Commission, January, 1981.
-
-
-
-
21
-
-
33845439531
-
-
Shangping Ren, Limin Shen, Jeffrey Tsai: Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems. SUTC (1) 2006: 60-67
-
Shangping Ren, Limin Shen, Jeffrey Tsai: Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems. SUTC (1) 2006: 60-67
-
-
-
-
22
-
-
33746268966
-
-
Shangping Ren, Yue Yu. Nianen Chen, Kevin Marth, Pierre-Etienne Poirot, Limin Shen: Actors, Roles and Coordinators - A Coordination Model for Open Distributed and Embedded Systems. COORDINATION 2006: 247-265
-
Shangping Ren, Yue Yu. Nianen Chen, Kevin Marth, Pierre-Etienne Poirot, Limin Shen: Actors, Roles and Coordinators - A Coordination Model for Open Distributed and Embedded Systems. COORDINATION 2006: 247-265
-
-
-
|