{"title":"SysML中故障检测和恢复的建模","authors":"M. Hecht, J. Tamaki, Derek Lo","doi":"10.1109/ISSREW.2013.6688879","DOIUrl":null,"url":null,"abstract":"• Question — How can Failure Modes and Effects Analyses be generated from SysML models? • Motivation — Technical: Growing ubiquity, complexity, and safety criticality of systems containing software — Programmatic: Reduce cost and schedule burden of FMEAs to levels tolerated by developers and their management — Cultural: Growing use of SysML and • Method — Define success criterion and ensure model includes it — Create Structural models (primarily the system connections in internal block diagrams) that can be used to assess the success criterion — Create behavioral models for both normal flows and flows in the presence of simulated failures and cyber-attacks — Run simulations and log results — Analyze the logs and develop assessment artifacts.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Modeling of Failure detection and recovery in SysML\",\"authors\":\"M. Hecht, J. Tamaki, Derek Lo\",\"doi\":\"10.1109/ISSREW.2013.6688879\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"• Question — How can Failure Modes and Effects Analyses be generated from SysML models? • Motivation — Technical: Growing ubiquity, complexity, and safety criticality of systems containing software — Programmatic: Reduce cost and schedule burden of FMEAs to levels tolerated by developers and their management — Cultural: Growing use of SysML and • Method — Define success criterion and ensure model includes it — Create Structural models (primarily the system connections in internal block diagrams) that can be used to assess the success criterion — Create behavioral models for both normal flows and flows in the presence of simulated failures and cyber-attacks — Run simulations and log results — Analyze the logs and develop assessment artifacts.\",\"PeriodicalId\":332420,\"journal\":{\"name\":\"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSREW.2013.6688879\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSREW.2013.6688879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling of Failure detection and recovery in SysML
• Question — How can Failure Modes and Effects Analyses be generated from SysML models? • Motivation — Technical: Growing ubiquity, complexity, and safety criticality of systems containing software — Programmatic: Reduce cost and schedule burden of FMEAs to levels tolerated by developers and their management — Cultural: Growing use of SysML and • Method — Define success criterion and ensure model includes it — Create Structural models (primarily the system connections in internal block diagrams) that can be used to assess the success criterion — Create behavioral models for both normal flows and flows in the presence of simulated failures and cyber-attacks — Run simulations and log results — Analyze the logs and develop assessment artifacts.