暂无分享,去创建一个
Radu Calinescu | James Law | Mario Gleirscher | John Clark | Nikita Johnson | Panayiotis Karachristou | John A. Clark | Mario Gleirscher | Nikita Johnson | Panayiotis Karachristou | R. Calinescu | James Law | N. Johnson
[1] Robert P. Bostrom,et al. MIS Problems and failures: a sociotechnical perspective part I: the cause , 1977 .
[2] Robert P. Bostrom,et al. Mis problems and failures: a socio-technical perspective , 1977 .
[3] Richard Hugh Jones. A study of safety and production problems and safety strategies associated with industrial robot systems , 1986 .
[4] Warren Gilchrist,et al. Modelling Failure Modes and Effects Analysis , 1993 .
[5] Daoud Ait Kadi,et al. A STATE-OF-THE-ART REVIEW OF FMEA/FMECA , 1994 .
[6] Rick Kazman,et al. The architecture tradeoff analysis method , 1998, Proceedings. Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193).
[7] Tim Kelly,et al. Arguing Safety - A Systematic Approach to Managing Safety Cases , 1998 .
[8] Jonathan D. Moffett,et al. The Integration of Safety and Security Requirements , 1999, SAFECOMP.
[9] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[10] John A. McDermid,et al. Hierarchically Performed Hazard Origin and Propagation Studies , 1999, SAFECOMP.
[11] Rune Winther,et al. Security Assessments of Safety Critical Systems Using HAZOPs , 2001, SAFECOMP.
[12] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[13] John A. Clark,et al. Effective Security Requirements Analysis: HAZOP and Use Cases , 2004, ISC.
[14] Gary McGraw,et al. Software Penetration Testing , 2005, IEEE Secur. Priv..
[15] G. Giralt,et al. Safe and dependable physical human-robot interaction in anthropic domains: State of the art and challenges , 2006, 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[16] George Despotou,et al. Addressing challenges of hazard analysis in systems of systems , 2009, 2009 3rd Annual IEEE Systems Conference.
[17] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[18] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[19] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[20] Vasilis Fthenakis,et al. Hazard and operability (HAZOP) analysis. A literature review. , 2010, Journal of hazardous materials.
[21] Nancy G. Leveson,et al. Engineering a Safer World: Systems Thinking Applied to Safety , 2012 .
[22] Chris W. Johnson,et al. Generic security cases for information system security in healthcare systems , 2012 .
[23] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[24] B. Scassellati,et al. Challenges in Shared-Environment Human-Robot Collaboration , 2013 .
[25] Ludovic Piètre-Cambacédès,et al. Cross-fertilization between safety and security engineering , 2013, Reliab. Eng. Syst. Saf..
[26] Adam Shostack,et al. Threat Modeling: Designing for Security , 2014 .
[27] Antonio Bicchi,et al. Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems , 2014 .
[28] Nancy G. Leveson,et al. Inside Risks An Integrated Approach to Safety and Security Based on Systems Theory , 2013 .
[29] Aditya P. Mathur,et al. Aligning Cyber-Physical System Safety and Security , 2014, CSDM Asia.
[30] Christoph Schmittner,et al. FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles , 2014, SAFECOMP Workshops.
[31] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[32] Leandros A. Maglaras,et al. Measuring the Risk of Cyber Attack in Industrial Control Systems , 2016, ICS-CSR.
[33] Vijay Pawar,et al. Manufacturing Robotics The Next Robotic Industrial Revolution , 2016 .
[34] Christian Steger,et al. Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data , 2017, RoboCup.
[35] Jeremy Straub,et al. Using deep learning to detect network intrusions and malware in autonomous robots , 2017, Defense + Security.
[36] Noor Quddus,et al. Bow-tie Analysis of Underwater Robots in Offshore Oil and Gas Operations , 2017 .
[37] F. Maggi,et al. Rogue Robots : Testing the Limits of an Industrial Robot ’ s Security , 2017 .
[38] Sakir Sezer,et al. STPA-SafeSec: Safety and security analysis for cyber-physical systems , 2017, J. Inf. Secur. Appl..
[39] Peter Schartner,et al. Security for the Robot Operating System , 2017, Robotics Auton. Syst..
[40] Jean-Marie Flaus,et al. A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis , 2018, Comput. Secur..
[41] Mathias Brandstötter,et al. Safety-Related Risks and Opportunities of Key Design-Aspects for Industrial Human-Robot Collaboration , 2018, ICR.
[42] Enrique Soriano,et al. Quantitative analysis of security in distributed robotic frameworks , 2018, Robotics Auton. Syst..
[43] Advanced industrial robotics: taking human-robot collaboration to the next level , 2018 .
[44] D. Lichte,et al. Use case-based consideration of safety and security in cyber physical production systems applied to a collaborative robot system , 2018 .
[45] Omar Tantawi,et al. Advances in Industrial Robotics: From Industry 3.0 Automation to Industry 4.0 Collaboration , 2019, 2019 4th Technology Innovation Management and Engineering Science International Conference (TIMES-iCON).
[46] Giulio Rosati,et al. Human-Robot Collaboration in Manufacturing Applications: A Review , 2019, Robotics.
[47] Tim Kelly,et al. Devil's in the Detail: Through-Life Safety and Security Co-assurance Using SSAF , 2019, SAFECOMP.
[48] Gilbert Tang,et al. Human–Robot Shared Workspace in Aerospace Factories , 2019 .
[49] Yao Guo,et al. Policy-Based Access Control for Robotic Applications , 2019, 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE).
[50] Tim Kelly,et al. An Assurance Framework for Independent Co-assurance of Safety and Security , 2019, ArXiv.
[51] Andy Brazier,et al. Hazard and operability (HAZOP) analysis , 2021 .