P. Abdulla, J. Deneux, G. Stålmarck, H. Ågren & O. Åkerlund (2006):
Designing Safe, Reliable Systems Using SCADE.
In: Leveraging Applications of Formal Methods,
LNCS 4313.
Springer,
pp. 115–129,
doi:10.1007/11925040_8.
O. Akerlund, S. Nadjm-Tehrani & G. Stålmarck (1999):
Integration of Formal Methods into System Safety and Reliability Analysis.
In: Proceedings of 17th International Systems Safety Conference,
pp. 326–336.
P. Bieber, C. Castel & C. Seguin (2002):
Combination of Fault Tree Analysis and Model Checking for Safety Assessment of Complex System.
In: Dependable Computing EDCC-4.
Springer,
pp. 19–31,
doi:10.1007/3-540-36080-8_3.
M. Bozzano & A. Villafiorita (2007):
The FSAP/NuSMV-SA Safety Analysis Platform.
International Journal on Software Tools for Technology Transfer 9(1),
pp. 5–24,
doi:10.1007/s10009-006-0001-2.
R.E. Bryant (1986):
Graph-Based Algorithms for Boolean Function Manipulation.
IEEE Transactions on Computers C-35(8),
pp. 677–691,
doi:10.1109/TC.1986.1676819.
A. Cerone, S. Connelly & P. A. Lindsay (2008):
Formal analysis of human operator behavioural patterns in interactive surveillance systems.
Software and Systems Modeling 7(3),
pp. 273–286,
doi:10.1007/s10270-007-0072-x.
S. Cha, H. Son, J. Yoo, E. Jee & P.H. Seong (2003):
Systematic Evaluation of Fault Trees using Real-time Model Checker UPPAAL.
Reliability Engineering & System Safety 82(1),
pp. 11 – 20,
doi:10.1016/S0951-8320(03)00059-0.
E.M. Clarke, Jr., O. Grumberg & D.A. Peled (1999):
Model Checking.
MIT Press.
C. Courcoubetis, M.Y. Vardi, P. Wolper & M. Yannakakis (1992):
Memory-Efficient Algorithms for the Verification of Temporal Properties.
Formal Methods in System Design 1(2/3),
pp. 275–288,
doi:10.1007/BF00121128.
R.G. Dromey (2003):
From Requirements to Design: Formalizing the Key Steps.
In: 1st International Conference on Software Engineering and Formal Methods.
IEEE Computer Society,
pp. 2–11,
doi:10.1109/SEFM.2003.1236202.
International Electrotechnical Commission (2010):
Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems. Part 1: General requirements.
International Standard IEC 61508-1.
D. Kozen (1983):
Results on the Propositional mu-Calculus.
Theoretical Computer Science 27,
pp. 333–354,
doi:10.1016/0304-3975(82)90125-6.
S. Kromodimoeljo (2014):
Controlling the Generation of Multiple Counterexamples in LTL Model Checking.
phdthesis,
doi:10.14264/uql.2015.16.
N. Leveson (1995):
Safeware - System Safety and Computers: A Guide to Preventing Accidents and Losses caused by Technology.
Addison-Wesley.
L.Grunske, K. Winter, N. Yatapanage, S. Zafar,Saad & P.A. Lindsay (2011):
Experience with Fault Injection Experiments for FMEA.
Software: Practice and Experience 41(11),
pp. 1233–1258,
doi:10.1002/spe.1039.
P.A. Lindsay, K. Winter & S. Kromodimoeljo (2012):
Model-based Safety Risk Assessment using Behavior Trees.
In: Proceedings of the 6th Asia Pacific Conference on System Engineering.
Systems Engineering Society of Australia.
Available at http://staff.itee.uq.edu.au/pal/papers/SETE2012.pdf.
P.A. Lindsay, N. Yatapanage & K. Winter (2012):
Cut Set Analysis using Behavior Trees and Model Checking.
Formal Aspects of Computing 24(2),
pp. 249–266,
doi:10.1007/s00165-011-0181-8.
S. Minato (1993):
Fast Generation of Prime-Irredundant Covers from Binary Decision Diagrams.
IEICE Transactions on Fundamentals of E76-A(6),
pp. 967–973.
E. Morreale (1970):
Recursive Operators for Prime Implicant and Irredundant Normal Form Determination.
IEEE Transactions on Computers 19(6),
pp. 504–509,
doi:10.1109/T-C.1970.222967.
L. de Moura, S. Owre, H. Rue\IeCß, J. Rushby, N. Shankar, M. Sorea & A. Tiwari (2004):
SAL 2.
In: 16th International Conference on Computer Aided Verification,
LNCS 3114.
Springer,
pp. 496–500,
doi:10.1007/978-3-540-27813-9_45.
F. Ortmeier, W. Reif & G. Schellhorn (2006):
Deductive Cause-Consequence Analysis (DCCA).
Proceedings of IFAC World Congress.
F. Ortmeier & G. Schellhorn (2007):
Formal Fault Tree Analysis - Practical Experiences.
Electronic Notes in Theoretical Computer Science 185,
pp. 139 – 151,
doi:10.1016/j.entcs.2007.05.034.
Y. Papadopoulos & M. Maruhn (2001):
Model-Based Synthesis of Fault Trees from Matlab-Simulink Models.
In: Proc. Int. Conf. on Dependable Systems and Networks (DSN 2001).
IEEE Computer Society,
pp. 77–82,
doi:10.1109/DSN.2001.941393.
D. Peled, T. Wilke & P. Wolper (1996):
An Algorithmic Approach for Checking Closure Properties of ω-Regular Languages.
In: 7th International Conference on Concurrency Theory,
LNCS 1119.
Springer,
pp. 596–610,
doi:10.1016/S0304-3975(97)00219-3.
A. Pnueli (1977):
The Temporal Logic of Programs.
In: 18th Annual Symposium on Foundations of Computer Science.
IEEE Computer Society,
pp. 46–57,
doi:10.1109/SFCS.1977.32.
A. Rae & P. Lindsay (2004):
A Behaviour-based Method for Fault Tree Generation.
In: Proceedings of 22nd Internatonal System Safety Conference.
System Safety Society,
pp. 289–298.