1 |
J. Shi, J. Wan, H. Yan, H. Suo, "A survey of cyber-physical systems," Proc. of Wireless Communications and Signal Processing Conference, Nov. 2011. |
미소장 |
2 |
Review of hazard analysis methods and their basic characteristics  |
미소장 |
3 |
S. Oveisi and R. Ravanmehr, "Analysis of software safety and reliability methods in cyber physical systems," Int. J. Critical Infrastructures, Vol. 13, No. 1, pp. 1-15, Jan. 2017. |
미소장 |
4 |
E. A. Lee, "Cyber Physical Systems: Design Challenges,"Proc. of the 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing, pp. 363-369, Jan. 2008. |
미소장 |
5 |
J. Lee, B. Bagheri, and H. A. Kao, "A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems," Journal of Manufacturing Letters, Vol. 3, pp. 18-23, Jan. 2015. |
미소장 |
6 |
M. Tuo, X. Zhou, G. Yang, N. Fu, "An Approach for Safety Analysis of Cyber-Physical System Based on Model Transformation," 2016 IEEE International Conference on Internet of Things (iThings)and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber, Physical and Social Computing(CPSCom) and IEEE Smart Data (SmartData), pp. 636-639, 2016. |
미소장 |
7 |
HYSDEL-a tool for generating computational hybrid models for analysis and synthesis problems  |
미소장 |
8 |
G. Howard, M. Butler, J. Colley, V. Sassone, "Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology," 2017 IEEE European Symposium on Security and Privacy Workshops(EuroS&PW), pp. 174-180, Apr. 2017. |
미소장 |
9 |
F. Redmill, "IEC 61508-principles and use in the management of safety," Manufacturing Letters, Vol. 9, No. 5, pp. 205-213, Oct. 1998. |
미소장 |
10 |
S. W. Nam, D. Horn, J. E. Hong, "Identifying Semantic Relationship between Safety Analysis Techniques to Support Traceability in multiple CPS development," Korea Computer Congress 2018, pp. 476-478, Jun. 2018. (in Korean) |
미소장 |
11 |
Y. Peng, T. Lu, etc., "Cyber-Physical System Risk Assessment," 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 442-447, Oct. 2013. |
미소장 |
12 |
A Survey of Safety Analysis Techniques for Safety Critical Systems  |
미소장 |
13 |
W. M. P. van der Aalst, A. H. M. ter Hofstede, M. Weske, "Business Process Management: A Survey,"International Conference on Business Process Management, pp. 1-12, May, 2003. |
미소장 |
14 |
M. Towhidnejad, D. R. Wallace, A. M. Gallo, "Fault tree analysis for software design," 27th Annual NASA Goddard/IEEE Software Engineering Workshop, pp. 1-6, Dec. 2003. |
미소장 |
15 |
S. K. Kim and Y. S. Kim, "Evaluation Process for the Hardware Safety Integrity Level," International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, Vol. 7, No. 4, pp. 547-551, Apr. 2013. |
미소장 |
16 |
J. P. Notander, M. Host, P. Runeson, "Challenges in Flexible Safety-Critical Software Development -An Industrial Qualitative Survey," International Conference on Product Focused Software Process Improvement, pp. 283-297, Jun. 2013. |
미소장 |
17 |
Wikipedia. (2014, Sep 22). IEC61508 [Online]. Available:http://ko.wikipedia.org/wiki/IEC_61508 (downloaded 2018, Jul. 25) |
미소장 |
18 |
Software Safety and Security Risk Mitigation in Cyber-physical Systems  |
미소장 |
19 |
A. Chevallier, Strategic Thinking in Complex Problem Solving, pp. 78, Oxford University Press, Oxford, 2016. |
미소장 |
20 |
K. H. Kim, Standard for Automatic Incident Detection System - Part 1. Basic requirements, pp. 1-9, Intelligent Transport Society of Korea, 2015. |
미소장 |
21 |
K. H. Kim, Standard for Automatic Incident Detection System - Part 2. Information exchange, pp. 1-19, Intelligent Transport Society of Korea, 2015. |
미소장 |
22 |
K. H. Kim, Standard for Automatic Incident Detection System - Part 3. System specification, pp. 1-8, Intelligent Transport Society of Korea, 2015. |
미소장 |