References

  1. Dalal Alrajeh, Hana Chockler & Joseph Y Halpern (2018): Combining ExpertsCausal Judgments. In: Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18).
  2. John R Anderson, Michael Matessa & Christian Lebiere (1997): ACT-R: A theory of higher level cognition and its relation to visual attention. Human-Computer Interaction 12(4), pp. 439–462, doi:10.1016/0010-0285(80)90005-5.
  3. John Annett (2003): Hierarchical task analysis. In: Handbook of cognitive task design. CRC Press, pp. 41–60, doi:10.1201/9781410607775.ch2.
  4. Glenn Bruns & Stuart Anderson (1993): Validating safety models with fault trees. In: SAFECOMP93. Springer, pp. 21–30, doi:10.1007/978-1-4471-2061-2_3.
  5. Meir Friedenberg & Joseph Y Halpern (2018): Combining the Causal Judgments of Experts with Possibly Different Focus Areas. Available at http://www.cs.cornell.edu/home/halpern/papers/focus.pdf.
  6. Andy Greenberg (2015): Hackers Remotely Kill a Jeep on the HighwayWith Me in It. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. [Online; acc. 2019-01-24].
  7. Dave Grossman (2001): On killing. II: The psychological cost of learning to kill.. International Journal of Emergency Mental Health 3(3), pp. 137–144.
  8. Joseph Y Halpern (2015): A Modification of the Halpern-Pearl Definition of Causality.. In: International Joint Conference on Artificial Intelligence, pp. 3022–3033. Available at https://www.aaai.org/ocs/index.php/IJCAI/IJCAI15/paper/view/11058/11085.
  9. Joseph Y Halpern (2016): Actual causality. MiT Press, doi:10.7551/mitpress/10809.001.0001.
  10. Joseph Y. Halpern & Judea Pearl (2005): Causes and Explanations: A Structural-Model Approach. Part I: Causes. The British Journal for the Philosophy of Science 56(4), pp. 843–887, doi:10.1093/bjps/axi147.
  11. Joseph Y. Halpern & Judea Pearl (2005): Causes and Explanations: A Structural-Model Approach. Part II: Explanations. The British Journal for the Philosophy of Science 56(4), pp. 889–911, doi:10.1093/bjps/axi148.
  12. Amjad Ibrahim, Severin Kacianka, Alexander Pretschner, Charles Hartsell & Gabor Karsai (submitted): Practical Causal Models for Cyber-Physical Systems.
  13. Rolf Isermann, Ralf Schwarz & Stefan Stolzl (2002): Fault-tolerant drive-by-wire systems. IEEE Control Systems 22(5), pp. 64–81, doi:10.1109/MCS.2002.1035218.
  14. Severin Kacianka & Alexander Pretschner (2018): Understanding and Formalizing Accountability for Cyber-Physical Systems. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, pp. 3165–3170, doi:10.1109/SMC.2018.00536.
  15. Astrid Kassner, Martin Baumann & Lars Weber (2011): A Hierarchical Task Analysis of Merging onto a Freeway—Comparison of Driver's and Driver Model's Task Representation, doi:10.1007/978-88-470-1821-1_31.
  16. Barbara Kordy, Ludovic Piètre-Cambacédès & Patrick Schweitzer (2014): DAG-based attack and defense modeling: Don't miss the forest for the attack trees. Computer science review 13, pp. 1–38, doi:10.1016/j.cosrev.2014.07.001.
  17. YF Liu & ZH Wu (2006): Driver behavior modeling in ACT-R cognitive architecture. Zhejiang Daxue Xuebao (Gongxue Ban) 40(10), pp. 1657–1662.
  18. Andreas Lüdtke, Jan-Patrick Osterloh, Tina Mioch, Frank Rister & Rosemarijn Looije (2010): Cognitive Modelling of Pilot Errors and Error Recovery in Flight Management Tasks, doi:10.1007/978-3-642-03655-2_59.
  19. Andreas Lüdtke, Lars Weber, Jan-Patrick Osterloh & Bertram Wortelen (2009): Modeling Pilot and Driver Behavior for Human Error Simulation. In: Vincent G. Duffy: Digital Human Modeling. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 403–412, doi:10.1007/978-3-642-02809-0_43.
  20. Sjouke Mauw & Martijn Oostdijk (2005): Foundations of Attack Trees. In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 186–198, doi:10.1007/11734727_17.
  21. Judea Pearl & Dana Mackenzie (2018): The Book of Why. New York, NY: Basic Books.
  22. Enno Ruijters & Mariëlle Stoelinga (2015): Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools. Computer science review 15, pp. 29–62, doi:10.1016/j.cosrev.2015.03.001.
  23. Dario D Salvucci (2006): Modeling driver behavior in a cognitive architecture. Human factors 48(2), pp. 362–380, doi:10.1037/0096-1523.29.2.363.
  24. Bruce Schneier (1999): Attack Trees - Modeling security threats. Dr. Dobb's Journal. Available at http://www.schneier.com/paper-attacktrees-ddj-ft.html.
  25. Bruce Schneier (2004): Secrets and lies - digital security in a networked world: with new information about post-9/11 security. Wiley.
  26. W.E. Vesely, F.F. Goldberg, N.H. Roberts & D.F. Haasl (1981): Fault Tree Handbook.
  27. Lars Weber, Martin Baumann, Andreas Lüdtke & Rike Steenken (2009): Modellierung von Entscheidungen beim Einfädeln auf die Autobahn. To appear: Fortschritts-Berichte VDI: Der Mensch im Mittelpunkt technischer Systeme 8.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org