2009 International Conference on Information Technology and Computer Science 2009
DOI: 10.1109/itcs.2009.254
View full text | Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Finally, we explain cooperation with multiple safety analysis methods. Hong et al [35] proposed the following safety improving method: calculating the minimum cut-set of FT by conducting FTA, identifying the fault with the highest risk, and planning the countermeasure by conducting FMEA. Oveisi [36] proposed an approach to improve the CSW's safety throughout the software development lifecycle using hazard analysis in the upper development process, FTA and FMEA in the middle development process, and detailed FTA and FMEA in the lower development process.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we explain cooperation with multiple safety analysis methods. Hong et al [35] proposed the following safety improving method: calculating the minimum cut-set of FT by conducting FTA, identifying the fault with the highest risk, and planning the countermeasure by conducting FMEA. Oveisi [36] proposed an approach to improve the CSW's safety throughout the software development lifecycle using hazard analysis in the upper development process, FTA and FMEA in the middle development process, and detailed FTA and FMEA in the lower development process.…”
Section: Related Workmentioning
confidence: 99%
“…The most direct way of electronic eavesdropping is for spy software to be installed onto a device to collect and forward information within another phone or server disabling the phone permanently (BRICK) [10][11][12].…”
Section: Curb Wireless Interfacesmentioning
confidence: 99%
“…Another virus is the proof of concept virus EPOC, well known cabir, which came out in 2004, and spreaded over Bluetooth. Since then, hundreds of viruses have come into being [11][12].…”
Section: Curb Wireless Interfacesmentioning
confidence: 99%
See 1 more Smart Citation
“…Integrated FTA and FMEA has been employed coherently and concurrently to enhance and complement each other in several reliability applications. Forward integration (i.e., FMEA to FTA) and backward integration (i.e., FTA to FMEA) have been proposed, with divers' advantages associated with each integration direction [5,6]. Lutz & Woodhouse [7] also propounded a bi-directional intertwine of both techniques and used it to certify safety-critical software, paving the way for numerous studies on integrating the software domains of both tools.…”
Section: Introductionmentioning
confidence: 99%