Page 357 -
P. 357

Chapter 12   Dependability and security specification12   Dependability and security specification
                  340
                  340   Chapter


                      Leveson, N. and Stolzy, J. (1987). ‘Safety analysis using Petri nets’. IEEE Transactions on Software
                      Engineering, 13 (3), 386–397.

                      Leveson, N. G. (1995). Safeware: System Safety and Computers. Reading, Mass.: Addison-Wesley.
                      Miller, S. P., Anderson, E. A., Wagner, L. G., Whalen, M. W. and Heimdahl, M. P. E. (2005). ‘Formal
                      Verification of Flight Control Software’. Proc. AIAA Guidance, Navigation and Control Conference,
                      San Francisco.
                      Peterson, J. L. (1981). Petri Net Theory and the Modeling of Systems. New York: McGraw-Hill.
                      Schneier, B. (1999). ‘Attack Trees’. Dr Dobbs Journal, 24 (12), 1–9.

                      Storey, N. (1996). Safety-Critical Computer Systems. Harlow, UK: Addison-Wesley.
                      Wordsworth, J. (1996). Software Engineering with B. Wokingham: Addison-Wesley.
   352   353   354   355   356   357   358   359   360   361   362