2006 IEEE Aerospace Conference
DOI: 10.1109/aero.2006.1656173
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In order to help with this goal, the fundamentals of hazard-vulnerability pairs and propagation path identification were presented by Malin and Fleming in [4]. The proposed scheme in this thesis is applied to a satellite electrical power system (EPS) using the System Modeling Language (SysML) and XMISearch tool for scripting hazardous scenarios.…”
Section: Goalsmentioning
confidence: 99%
“…In order to help with this goal, the fundamentals of hazard-vulnerability pairs and propagation path identification were presented by Malin and Fleming in [4]. The proposed scheme in this thesis is applied to a satellite electrical power system (EPS) using the System Modeling Language (SysML) and XMISearch tool for scripting hazardous scenarios.…”
Section: Goalsmentioning
confidence: 99%
“…A static search method is used based on the work of Malin et al . ( 27 ) to find the cross‐equipment potential interaction hazard in the extended GTST‐MLD. The search first finds potential hazard interaction pairs, i.e., the threat donor that produces vulnerable flows and the accepter component that accepts the vulnerable flows.…”
Section: Interaction Analysismentioning
confidence: 99%
“…Based on the connection relationship, paths from the threat-accepter component to the threat donor can be identified using constraints associated with configuration and connections knowledge. A static search method is used based on the work of Malin et al (27) to find the cross-equipment potential interaction hazard in the extended GTST-MLD. The search first finds potential hazard interaction pairs, i.e., the threat donor that produces vulnerable flows and the accepter component that accepts the vulnerable flows.…”
Section: Equipment Hierarchy Analysismentioning
confidence: 99%