Bus architectures for safety-critical embedded systems

J Rushby - International Workshop on Embedded Software, 2001 - Springer
Embedded systems for safety-critical applications often integrate multiple “functions” and
must generally be fault-tolerant. These requirements lead to a need for mechanisms and …

Basic concepts and taxonomy of dependable and secure computing

A Avizienis, JC Laprie, B Randell… - IEEE transactions on …, 2004 - ieeexplore.ieee.org
This paper gives the main definitions relating to dependability, a generic concept including a
special case of such attributes as reliability, availability, safety, integrity, maintainability, etc …

[图书][B] Introduction to formal hardware verification

T Kropf - 2013 - books.google.com
This advanced textbook presents an almost complete overview of techniques for hardware
verification. It covers all approaches used in existing tools, such as binary and word-level …

Survey and perspective on verification, validation, and uncertainty quantification of digital twins for precision medicine

K Sel, A Hawkins-Daarud, A Chaudhuri, D Osman… - npj Digital …, 2025 - nature.com
Digital twins in precision medicine provide tailored health recommendations by simulating
patient-specific trajectories and interventions. We examine the critical role of Verification …

Partitioning in avionics architectures: Requirements, mechanisms, and assurance

J Rushby - 1999 - ntrs.nasa.gov
Automated aircraft control has traditionally been divided into distinct" functions" that are
implemented separately (eg, autopilot, autothrottle, flight management); each function has its …

Experiences using lightweight formal methods for requirements modeling

S Easterbrook, R Lutz, R Covington… - IEEE Transactions …, 1998 - ieeexplore.ieee.org
The paper describes three case studies in the lightweight application of formal methods to
requirements modeling for spacecraft fault protection systems. The case studies differ from …

Software engineering for safety: a roadmap

RR Lutz - Proceedings of the Conference on the Future of …, 2000 - dl.acm.org
Software Engineering for Safety: A Roadmap Robyn Lutz Page 1 Software Engineering for
Safety: A Roadmap Robyn Lutz Key Research Pointers Provide readier access to formal …

Brain: Behavior based adaptive intrusion detection in networks: Using hardware performance counters to detect ddos attacks

V Jyothi, X Wang, SK Addepalli… - 2016 29th international …, 2016 - ieeexplore.ieee.org
Denial-of-Service (DoS) and Distributed Denial-of Service (DDoS) attacks account for one
third of all service downtime incidents. Current DoS/DDoS attacks are not only limited to …

The ethics of safety-critical systems

J Bowen - Communications of the ACM, 2000 - dl.acm.org
Any scientifically based activity requires a level of responsibility and it is important those
involved understand the associated moral questions. Science has developed technology …

[PDF][PDF] Monitoring, testing and debugging of distributed real-time systems

H Thane - 2000 - diva-portal.org
Testing is an important part of any software development project, and can typically surpass
more than half of the development cost. For safety-critical computer based systems, testing is …