Page 357 -
P. 357
Chapter 12 Dependability and security specification12 Dependability and security specification
340
340 Chapter
Leveson, N. and Stolzy, J. (1987). ‘Safety analysis using Petri nets’. IEEE Transactions on Software
Engineering, 13 (3), 386–397.
Leveson, N. G. (1995). Safeware: System Safety and Computers. Reading, Mass.: Addison-Wesley.
Miller, S. P., Anderson, E. A., Wagner, L. G., Whalen, M. W. and Heimdahl, M. P. E. (2005). ‘Formal
Verification of Flight Control Software’. Proc. AIAA Guidance, Navigation and Control Conference,
San Francisco.
Peterson, J. L. (1981). Petri Net Theory and the Modeling of Systems. New York: McGraw-Hill.
Schneier, B. (1999). ‘Attack Trees’. Dr Dobbs Journal, 24 (12), 1–9.
Storey, N. (1996). Safety-Critical Computer Systems. Harlow, UK: Addison-Wesley.
Wordsworth, J. (1996). Software Engineering with B. Wokingham: Addison-Wesley.