-
1
-
-
77954317331
-
Best current practice of software reliability engineering
-
M. R. Lyu, Ed. IEEE Computer Society Press, ch. 6
-
M. Donnelly, B. Everett, J. Musa, and G. Wilson, "Best current practice of software reliability engineering," in Handbook of Software Reliability Engineering, M. R. Lyu, Ed. IEEE Computer Society Press, 1996, ch. 6, pp. 219-254.
-
(1996)
Handbook of Software Reliability Engineering
, pp. 219-254
-
-
Donnelly, M.1
Everett, B.2
Musa, J.3
Wilson, G.4
-
2
-
-
0003707118
-
-
A. Abran, J. W. Moore, P. Bourque, and R. Dupuis, Eds., Los Alamitos, California: IEEE Computer Society, [Online]. Available
-
A. Abran, J. W. Moore, P. Bourque, and R. Dupuis, Eds., Guide to the Software Engineering Body of Knowledge. Los Alamitos, California: IEEE Computer Society, 2004. [Online]. Available: http://www.swebok.org/.
-
(2004)
Guide to the Software Engineering Body of Knowledge
-
-
-
6
-
-
79959729904
-
A dependability profile within MARTE
-
August, DOI: 10.1007/s10270-009-0128-1
-
S. Bernardi, J. Merseguer, and D. Petriu, "A dependability profile within MARTE," Software and Systems Modeling, August 2009, DOI: 10.1007/s10270-009-0128-1.
-
(2009)
Software and Systems Modeling
-
-
Bernardi, S.1
Merseguer, J.2
Petriu, D.3
-
7
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
DOI 10.1109/TDSC.2004.2
-
A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 01, no. 1, pp. 11-33, 2004. (Pubitemid 40134576)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
8
-
-
51849096343
-
The CRUTIAL architecture for critical information infrastructures
-
ser. LNCS 5135, R. de Lemos et al. Ed. Berlin Heidelberg
-
P. Verissimo, N. Neves, M. Correia, A. A. E. Kalam, and A. Bondavalli, "The CRUTIAL architecture for critical information infrastructures," in Architecting Dependable Systems V, ser. LNCS 5135, R. de Lemos et al., Ed., Berlin Heidelberg, 2008, pp. 1-27.
-
(2008)
Architecting Dependable Systems V
, pp. 1-27
-
-
Verissimo, P.1
Neves, N.2
Correia, M.3
Kalam, A.A.E.4
Bondavalli, A.5
-
9
-
-
52149097113
-
Model-driven assessment of system dependability
-
S. Mustafiz, X. Sun, J. Kienzle, and H. Vangheluwe, "Model-driven assessment of system dependability," Journal of Software and Systems Modeling, vol. 7, no. 4, pp. 487-502, 2008.
-
(2008)
Journal of Software and Systems Modeling
, vol.7
, Issue.4
, pp. 487-502
-
-
Mustafiz, S.1
Sun, X.2
Kienzle, J.3
Vangheluwe, H.4
-
10
-
-
70349148929
-
Addressing degraded service outcomes and exceptional modes of operation in behavioural models
-
New York, NY, USA: ACM
-
S. Mustafiz, J. Kienzle, and A. Berlizev, "Addressing degraded service outcomes and exceptional modes of operation in behavioural models," in Proc. of the RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems (SERENE'08). New York, NY, USA: ACM, 2008, pp. 19-28.
-
(2008)
Proc. of the RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems (SERENE'08)
, pp. 19-28
-
-
Mustafiz, S.1
Kienzle, J.2
Berlizev, A.3
-
12
-
-
31044434638
-
A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project
-
P. Donzelli and V. Basili, "A practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project," Journal of System and Software, vol. 79, pp. 107-119, 2006.
-
(2006)
Journal of System and Software
, vol.79
, pp. 107-119
-
-
Donzelli, P.1
Basili, V.2
-
14
-
-
33750359175
-
Integrating safety and formal analyses using UML and PFS
-
F. Iwu, A. Galloway, J. McDermid, and J. Toyn, "Integrating safety and formal analyses using UML and PFS," Reliability Engineering and System Safety, vol. 92, no. 2, pp. 156-170, 2007.
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.2
, pp. 156-170
-
-
Iwu, F.1
Galloway, A.2
Mcdermid, J.3
Toyn, J.4
-
15
-
-
38049082909
-
A UML profile for developing airworthiness-compliant (RTCA DO-178B), safety-critical software
-
ser. LNCS. Springer-Verlag
-
G. Zoughbi, L. Briand, and Y. Labiche, "A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software," in Proceedings of Models 2007, ser. LNCS. Springer-Verlag, 2007, vol. 4735, pp. 574-588.
-
(2007)
Proceedings of Models 2007
, vol.4735
, pp. 574-588
-
-
Zoughbi, G.1
Briand, L.2
Labiche, Y.3
-
16
-
-
34247277511
-
A UML Profile to model safety-critical embedded real-time control systems
-
Springer-Verlag Berlin Heidelberg
-
L. Shourong and A. Wolfgang, "A UML Profile to model safety-critical embedded real-time control systems," in Studies in Computational Intelligence (SCI). Springer-Verlag Berlin Heidelberg, 2007, vol. 42, pp. 197-218.
-
(2007)
Studies in Computational Intelligence (SCI)
, vol.42
, pp. 197-218
-
-
Shourong, L.1
Wolfgang, A.2
-
17
-
-
0242411475
-
Architectural-level risk analysis using UML
-
K. Goseva-Popstojanova et al., "Architectural-level risk analysis using UML," IEEE Transactions on Software Engineering, vol. 29, no. 10, pp. 946-960, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.10
, pp. 946-960
-
-
Goseva-Popstojanova, K.1
-
20
-
-
33750839637
-
Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle
-
R. Lutz, S. Nelson, A. Patterson-Hine, C. Frost, D. Tal, and R. Harris, "Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle," Requirements Engineering, vol. 12, no. 1, pp. 41-54, 2007.
-
(2007)
Requirements Engineering
, vol.12
, Issue.1
, pp. 41-54
-
-
Lutz, R.1
Nelson, S.2
Patterson-Hine, A.3
Frost, C.4
Tal, D.5
Harris, R.6
-
22
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C. Haley, R. Laney, J. D. Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 133-153, 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
24
-
-
56849095592
-
A UML profile for dependability analysis and modeling of software systems
-
Spain
-
S. Bernardi, J. Merseguer, and D. Petriu, "A UML profile for Dependability Analysis and Modeling of Software Systems," Universidad de Zaragoza, Spain, Tech. Rep. RR-08-05, 2008.
-
(2008)
Universidad de Zaragoza, Tech. Rep. RR-08-05
-
-
Bernardi, S.1
Merseguer, J.2
Petriu, D.3
-
26
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
I. Alexander, "Misuse cases: Use cases with hostile intent," IEEE Software, vol. 20, no. 1, pp. 58-66, 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
30
-
-
85013962790
-
Targeting safety-related errors during software requirements analysis
-
R. R. Lutz, "Targeting safety-related errors during software requirements analysis," in SIGSOFT FSE, 1993, pp. 99-106.
-
(1993)
SIGSOFT FSE
, pp. 99-106
-
-
Lutz, R.R.1
-
32
-
-
15944398393
-
A Software Fault Tree approach to requirement analysis of an intrusion detection system
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz, "A Software Fault Tree approach to requirement analysis of an intrusion detection system," Requirement Engineering, vol. 7, pp. 207-220, 2002.
-
(2002)
Requirement Engineering
, vol.7
, pp. 207-220
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
|