2005 IEEE Aerospace Conference 2005
DOI: 10.1109/aero.2005.1559729
|View full text |Cite
|
Sign up to set email alerts
|

Transforming functional requirements and risk information into models for analysis and simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Each design has its own module that potentially could result in interactive hazards after assembly. Malin et al ( 26 ) suggest a method for finding the path of the vulnerability pair to identify the cross‐subsystem interaction risks based on the component connection model, which describes the input/output flow propagation within the physical equipment components.…”
Section: Interaction Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Each design has its own module that potentially could result in interactive hazards after assembly. Malin et al ( 26 ) suggest a method for finding the path of the vulnerability pair to identify the cross‐subsystem interaction risks based on the component connection model, which describes the input/output flow propagation within the physical equipment components.…”
Section: Interaction Analysismentioning
confidence: 99%
“…First, the equipment connection model is constructed from the extended GTST‐MLD, and then the connection relationship can be defined by referring to the work. ( 26,30 ) Based on the GTST‐MLD model in Fig. 2 and the equipment connection attribute, a connection model for the unmanned spacecraft in Fig.…”
Section: Case Studymentioning
confidence: 99%