Advances in Computers [Elektronisk resurs] Dependable and Secure Systems Engineering.
-
Hurson, Ali. (författare)
-
Sedigh, Sahra. (författare)
- ISBN 9780123964694
- Publicerad: Burlington : Elsevier Science, 2012
- Engelska 1 online resource (209 p.)
Innehållsförteckning
Sammanfattning
Ämnesord
Stäng
- Front Cover; Dependable and Secure Systems Engineering; Copyright; Contents; Preface; References; Chapter 1: Combining Performance and Availability Analysis in Practice; 1. Introduction; 2. Approaches to Modeling; 2.1 Non-State-Space Models; 2.2 State-Space Models; 3. Practical Examples; 3.1 Pure Reliability/Availability and Pure Performance Analysis; 3.1.1 Two-Board System; 3.1.2 VAXcluster System; 3.1.3 Telecommunication Switching System; 3.2 Composite Performance and Availability Analysis; 3.2.1 Multiprocessor Systems; 3.2.2 Wireless Communication Network System; 3.2.3 Job Completion Time.
- 4. ConclusionsReferences; Chapter 2: Modeling, Analysis, and Testing of System Vulnerabilities; 1. Critical Features and Vulnerabilities of Human-Machine Systems; 2. Modeling the SUC and Its Environment; 2.1 Models of the SUC; 2.2 Conversions; 2.3 Complement and Completed System Models; 2.4 Transformed System Models; 2.4.1 Marking Operators; 2.4.1.1 Mark Start; 2.4.1.2 Mark Finish; 2.4.1.3 Mark Non-Start; 2.4.1.4 Mark Non-Finish; 2.4.2 Sequence Manipulation Operators; 2.4.2.1 Sequence Insertion; 2.4.2.2 Sequence Omission; 2.4.3 Event Manipulation Operators; 2.4.3.1 Event Insertion.
- 2.4.3.2 Event Omission2.4.4 Partial Complement Models via Transformations; 3. Behavioral Patterns of the SUC: Analysis and Test Aspects; 3.1 Coverage Criteria; 3.1.1 Coverage Criteria for Testing of System Functions; 3.1.2 Coverage Criteria for Testing Vulnerability Threats; 3.2 Test Generation; 3.2.1 Test Generation for Testing System Functions; 3.2.2 Test Generation for Testing Vulnerability Threats; 3.3 Remarks on the Test Process; 4. Ordering the Vulnerability Risks, Countermeasures; 5. Case Study; 5.1 SUC; 5.2 System Functions and Vulnerability Threats.
- 5.3 Risk Graph and Defense Mechanism5.4 Testing Safety Issues; 6. Related Work; 7. Conclusion, Limitations, and Future Work; References; Chapter 3: System Dependability...; 1. Introduction; 2. Dependability Measures; 2.1 Comprehensive Dependability Measures; 2.2 Specific Dependability Features and Measures; 2.3 Performance-Related Measures; 2.4 Comments on Features and Measures for Dependability Assessment; 3. Basic Dependability Assessment Approaches; 3.1 Assessment Based on Analytical Modeling; 3.1.1 Compositional Modeling Approaches; 3.1.2 Decomposition and Aggregation Approaches.
- 3.2 Assessment Based on Controlled Experiments3.2.1 Techniques for Injecting Hardware Faults; 3.2.2 Techniques for Injecting or Emulating Software Faults; 3.2.3 Message-Based Fault Injection; 3.3 Summary and Relationships Between the Assessment Approaches; 4. Benchmarking Concepts and Examples; 4.1 Examples of Performance Benchmarks; 4.1.1 EEMBC Benchmarks; 4.1.2 SPEC Benchmarks; 4.1.3 TPC Benchmarks; 4.2 Examples of Dependability Benchmarks; 5. Case Study: Benchmarking COTS-based Systems; 5.1 Presentation of the Considered I&C Systems; 5.2 Modeling of the I&C Systems.
- 5.3 Comparison of System 1 and System 2.
- Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technologyWell-known authors and researchers in the fieldExtensive bibliographies with m
Ämnesord
- Automatic Data Processing -- periodicals.
- Computers -- Periodicals.
- Electronic data processing -- Periodicals.
- Electronic data processing.
Genre
- Electronic books. (LCSH)
Klassifikation
- QA76 (LCC)
- 510.78 (DDC)
- Ta (kssb/8 (machine generated))
Inställningar
Hjälp
Titeln finns på 3 bibliotek.
Ange som favorit
-
Stockholms universitetsbibliotek, Digitala resurser (Hdig)Ange som favorit
-
-
Läs hela (Tillgänglig för användare inom Stockholms universitet) (Elsevier ScienceDirect Books Complete:Full Text)
Öppettider, adress m.m.
-
Kungliga Tekniska högskolan, E-resurser (Tdig)Ange som favorit
-
Bibliotekets lokala katalog
-
-
Läs hela (Online access for KTHB) (fulltext) (Elsevier eBooks)
Öppettider, adress m.m.
Ange som favorit
-
Lunds universitets bibliotek, Digitala resurser (Ldix)Ange som favorit
-
Titeln i bibliotekets lokala katalog
-
-
Läs hela (Online access for Lund University) (ScienceDirect eBooks - All Access) (ScienceDirect Book Series - Individual Titles)
Utlånad?Öppettider, adress m.m.