Skip to main content Accessibility help
×
Home
  • Print publication year: 2017
  • Online publication date: August 2017

6 - Fault Tree Analysis

from Part II - Non-State-Space (Combinatorial) Models
[1] IEC 61025, Fault Tree Analysis. IEC Standard No. 61025, 2nd edn., 2006.
[2] A., Hixenbaugh, Fault Tree for Safety. The Boeing Company, 1968.
[3] R., Barlow and F., Proschan, Statistical Theory of Reliability and Life Testing. Holt, Rinehart, and Winston, 1975.
[4] E., Henley and H., Kumamoto, Reliability Engineering and Risk Assessment. Prentice Hall, 1981.
[5] W., Lee, D., Grosh, F., Tillman, and C., Lie, “Fault tree analysis, methods and applications: A review,IEEE Transactions on Reliability, vol. R-34, pp. 194–203, 1985.
[6] S., Contini and A., Poucet, “Advances on fault tree and event tree techniques,” in System Reliability Assessment, eds. A., Colombo and A. S.de, Bustamante. Kluwer Academic P.G., 1990, pp. 77–102.
[7] W., Schneeweiss, The Fault Tree Method. LiLoLe Verlag, 1999.
[8] M., Stamatelatos and W., Vesely, Fault Tree Handbook with Aerospace Applications. NASA Office of Safety and Mission Assurance, 2002, vol. 1.1.
[9] E., Ruijters and M., Stoelinga, “Fault tree analysis: A survey of the state of the art in modeling, analysis and tools,Computer Science Review, vol. 15–16, pp. 29–62, 2015.
[10] M., Malhotra and K., Trivedi, “Power-hierarchy among dependability model types,IEEE Transactions on Reliability, vol. R-43, pp. 493–502, 1994.
[11] M., Malhotra and K., Trivedi, “Dependability modeling using Petri nets,IEEE Transactions on Reliability, vol. R-44, pp. 428–440, 1995.
[12] J., Jürjens, Developing Safety-Critical Systems with UML. Springer, 2003, pp. 360–372.
[13] S., Bernardi, J., Merseguer, and D., Petriu, “Dependability modeling and analysis of software systems specified with UML,” ACM Computing Surveys, vol. 45, no. 1, pp. 2:1–2:48, Dec. 2012.
[14] N., Piccinini and I., Ciarambino, “Operability analysis devoted to the development of logic trees,Reliability Engineering and System Safety, vol. 55, pp. 227–241, 1997.
[15] R., Sahner, K., Trivedi, and A., Puliafito, Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer Academic Publishers, 1996.
[16] K. S., Trivedi and R., Sahner, “SHARPE at the age of twenty-two,SIGMETRICS Perform. Eval. Rev., vol. 36, no. 4, pp. 52–57, Mar. 2009.
[17] W., Schneeweiss, Boolean Functions with Engineering Applications and Computer Programs. Springer Verlag, 1989.
[18] L., Ge, M. van, Asseldonk, and M. van, Galen, “Stochastic fault tree analysis for agropark project appraisal,” in Proc. 21st IFAMA – Internationl Food and Agribusiness Management Association, 2011.
[19] B., Ayyub, Risk Analysis in Engineering and Economics. Chapman and Hall/CRC, 2003.
[20] P., Lacey, “An application of fault tree analysis to the identification and management of risks in government funded human service delivery,” in Proc. 2nd Int. Conf. on Public Policy and Social Sciences, eds. K., Singh and B., Singh, 2011.
[21] G., Youngjung, S., Hyeonju, L., Sungjoo, and P., Yongtae, “Application of fault tree analysis to the service process: Service tree analysis approach,” Journal of Service Management, vol. 20, no. 4, p. 433–454, 2009.
[22] R., Fricks and K., Trivedi, “Importance analysis with Markov chains,” in Proc. IEEE Ann. Reliability and Maintainability Symp., 2003.
[23] G., Bucci, L., Carnevali, and E., Vicario, “A tool supporting evaluation of non-Markovian fault trees,” Proc. Int. Conf. on Quantitative Evaluation of Systems, pp. 115–116, 2008.
[24] J., Vaurio, “Treatment of general dependencies in system fault-tree and risk analysis,IEEE Transactions on Reliability, vol. 51, pp. 278–287, 2002.
[25] A. V., Ramesh, D. W., Twigg, U. R., Sandadi, T. C., Sharma, K. S., Trivedi, and A. K., Somani, “An integrated reliability modeling environment,Reliability Engineering and System Safety, vol. 65, no. 1, pp. 65–75, 1999.
[26] A., Rauzy, “New algorithms for fault tree analysis,Reliability Engineering and System Safety, vol. 40, pp. 203–211, 1993.
[27] R., Sinnamon and J., Andrews, “Improved accuracy in quantitative fault tree analysis,Quality and Reliability Engineering International, vol. 13, pp. 285–292, 1997.
[28] A., Rauzy, “A brief introduction to binary decision diagrams,Journal Européen des Systèmes Automatisés (RAIRO-APII-JESA), vol. 30, no. 8, pp. 1033–1051, 1996.
[29] L., Xing and S., Amari, Binary Decision Diagrams and Extensions for System Reliability Analysis. Wiley-Scrivener, 2015.
[30] Y., Dutuit and A., Rauzy, “A linear-time algorithm to find modules of fault tree,IEEE Transactions on Reliability, vol. 45, pp. 422–425, 1996.
[31] R., Gulati and J., Dugan, “A modular approach for analyzing static and dynamic fault-trees,” in Proc. IEEE Ann. Reliability and Maintainability Symp., 1997, pp. 57–63.
[32] Y., Dutuit and A., Rauzy, “Efficient algorithms to assess components and gates importance in fault tree analysis,Reliability Engineering and System Safety, vol. 72, pp. 213–222, 2000.
[33] S., Contini and V., Matuzas, “New methods to determine the importance measures of initiating and enabling events in fault tree analysis,Reliability Engineering and System Safety, vol. 96, no. 7, pp. 775–784, 2011.
[34] Z., Birnbaum, “On the importance of different components in a multicomponent systems,” in Multivariate Analysis - II, ed. E. P. R., Krishnaiah. Academic Press, 1969, pp. 581–592.
[35] M., Veeraraghavan and K., Trivedi, “An improved algorithm for the symbolic reliability analysis of networks,IEEE Transactions on Reliability, vol. 40, pp. 347–358, 1991.
[36] F. C., Meng, “Relationships of Fussell–Vesely and Birnbaum importance to structural importance in coherent systems,Reliability Engineering and System Safety, vol. 67, no. 1, pp. 55–60, 2000.
[37] K., Hjelmgren, S., Svensson, and O., Hannius, “Reliability analysis of a single-engine aircraft FADEC,” in Proc. Ann. Reliability and Maintainability Symp., 1998, pp. 401–407.
[38] W. E., Smith, K. S., Trivedi, L., Tomek, and J., Ackaret, “Availability analysis of blade server systems,IBM Systems Journal, vol. 47, no. 4, pp. 621–640, 2008.
[39] R., Credle, D., Brown, L., Davis, D., Robertson, T., Ternau, and D., Green, “The cutting edge: IBM E-Server BladeCenter,” IBM Redpaper REDP-3581-01, 2003.
[40] A., Bobbio, S., Bologna, E., Ciancamerla, P., Incalcaterra, C., Kropp, M., Minichino, and E., Tronci, “Advanced techniques for safety analysis applied to the gas turbine control system of ICARO co-generative plant,” in X TESEC (Genova), 2001, pp. 339–350.
[41] D., Nicol, W., Sanders, and K., Trivedi, “Model-based evaluation: From dependability to security,IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 48–65, 2004.
[42] A., Avizienis, J., Laprie, B., Randell, and C., Landwehr, “Basic concepts and taxonomy of dependable and secure computing,IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.
[43] R., Ortalo, Y., Deswarte, andM., Kaaniche, “Experimenting with quantitative evaluation tools for monitoring operational security,IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 633–650, Sep./Oct. 1999.
[44] K. S., Trivedi, D. S., Kim, A., Roy, and D., Medhi, “Dependability and security models,” in Proc. 7th Int. Workshop on Design of Reliable Communication Networks, 2009, pp. 11–20.
[45] L., Pietre-Cambacedes and M., Bouissou, “Cross-fertilization between safety and security engineering,Reliability Engineering and System Safety, vol. 110, pp. 110–126, 2013.
[46] B., Schneier, “Attack trees,Dr. Dobb's Journal of Software Tools, vol. 24, no. 12, pp. 21–29, 1999.
[47] I., Fovino, M., Masera, and A. D., Cian, “Integrating cyber attacks within fault trees,Reliability Engineering and System Safety, vol. 94, pp. 1394–1402, 2009.
[48] A., Roy, D. S., Kim, and S., Trivedi, “Act: Towards unifying the constructs of attack and defense trees,Security and Communication Networks, vol. 3, pp. 1–15, 2011.
[49] J., Byres, M., Franz, and D., Miller, “The use of attack trees in assessing vulnerabilities in SCADA systems,” in Int. Infrastructure Survivability Workshop (IISW'04), Lisbon, 2004.
[50] A., Roy, D. S., Kim, and S., Trivedi, “Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees,” in Proc. Int. Conf. on Dependable Systems and Networks (DSN 2012). IEEE Computer Society, 2012, pp. 1–12.
[51] A., Bobbio, L., Egidi, and R., Terruggia, “A methodology for qualitative/quantitative analysis of weighted attack trees,” in 4th IFAC Workshop on Dependable Control of Discrete Systems (DCDS13), York (UK), 4–6 Sep. 2013, p. 6.
[52] S., Zonouz, H., Khurana, W., Sanders, and T., Yardley, “RRE: A game-theoretic intrusion response and recovery engine,” in IEEE/IFIP Int. Conf. on Dependable Systems Networks, 2009, pp. 439–448.
[53] L., Caldarola, “Fault tree analysis with multistate components,” Kernforschungszentrum Karlsruhe, Tech. Rep. KfK 2761 – EUR 5756e, 1979.
[54] A., Wood, “Multistate block diagrams and fault trees,IEEE Transactions on Reliability, vol. R-34, pp. 236–240, 1985.
[55] Y., Kai, “Multistate fault-tree analysis,Reliability Engineering and System Safety, vol. 28, pp. 1–7, 1990.
[56] M., Veeraraghavan and K. S., Trivedi, “A combinatorial algorithm for performance and reliability analysis using multistate models,IEEE Transactions on Computers, vol. 43, no. 2, pp. 229–234, 1994.
[57] X., Zang, D., Wang, H., Sun, and K., Trivedi, “A BDD-based algorithm for analysis of multistate systems with multistate components,IEEE Transactions on Computers, vol. 52, no. 12, pp. 1608–1618, 2003.
[58] L., Xing and Y., Dai, “A new decision diagram based method for efficient analysis on multi-state systems,IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 3, pp. 161–174, 2009.
[59] S., Amari, L., Xing, A., Shrestha, J., Akers, and K., Trivedi, “Performability analysis of multistate computing systems using multivalued decision diagrams,IEEE Transactions on Computers, vol. 59, no. 10, pp. 1419–1433, 2010.
[60] K., Trivedi, X., Yin, and D. S., Kim, “Recent advances in system reliability,” in Multi-State Availability Modeling in Practice, eds. A., Lisnianski and I., Frenkel. Springer-Verlag, 2011.
[61] A., Bobbio, L., Portinale, M., Minichino, and E., Ciancamerla, “Improving the analysis of dependable systems by mapping fault trees into Bayesian networks,Reliability Engineering and System Safety, vol. 71, pp. 249–260, 2001.
[62] H., Boudali and J. B., Dugan, “A discrete-time Bayesian network reliability modeling and analysis framework,Reliability Engineering and System Safety, vol. 87, pp. 337–349, 2005.
[63] M., Neil and D., Marquez, “Availability modelling of repairable systems using Bayesian networks,Engineering Applications of Artificial Intelligence, vol. 25, no. 4, pp. 698–704, Jun. 2012.
[64] A., Bobbio, D., Codetta-Raiteri, S., Montani, and L., Portinale, “Reliability analysis of systems with dynamic dependencies,” in Bayesian Networks: A Practical Guide to Applications. John Wiley & Sons, 2008, pp. 225–238.
[65] J., Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988.
[66] O., Pourret, P., Naïm, and B., Marcot, Bayesian Networks: A Practical Guide to Applications. John Wiley & Sons, 2008.
[67] J., Torres-Toledano and L., Sucar, “Bayesian networks for reliability analysis of complex systems,” in Lecture Notes in Artificial Intelligence, vol. 1484. Springer Verlag, 1998, pp. 195–206.
[68] H., Langseth and L., Portinale, “Bayesian networks in reliability,Reliability Engineering and System Safety, vol. 92, pp. 92–108, 2007.
[69] P., Weber, G., Medina-Oliva, C., Simon, and B., Iung, “Overview on Bayesian network applications for dependability, risk analysis and maintenance areas,Engineering Applications of Artificial Intelligence, vol. 25, no. 4, pp. 671–682, Jun. 2012.
[70] L., Portinale and D., Codetta-Raiteri, Modeling and Analysis of Dependable Systems: A Probabilistic Graphical Model Perspective. World Scientific, 2015.
[71] J. B., Dugan, S., Bavuso, and M., Boyd, “Fault-trees and Markov models for reliability analysis of fault-tolerant digital systems,Reliability Engineering and System Safety, vol. 39, pp. 291–307, 1993.
[72] G., Cooper, “The computation complexity of probabilistic inference using Bayesian belief networks,Artificial Intelligence, vol. 33, pp. 393–405, 1990.
[73] N., Zhang and D., Poole, “Exploiting causal independence in Bayesian network inference,Journal of Artifical Intelligence Research, vol. 5, pp. 301–328, 1996.
[74] A., Moslehl, D. M., Rasmuson, and F. M., Marshall, Guidelines on Modeling Common-Cause Failures in Probabilistic Risk Assessment, NUREG/CR-5485. U.S. Nuclear Regulatory Commission, 1998.
[75] D., Codetta-Raiteri, A., Bobbio, S., Montani, and L., Portinale, “A dynamic Bayesian network based framework to evaluate cascading effects in power grids,Engineering Applications of Artificial Intelligence, vol. 25, pp. 683–697, 2012.
[76] L., Portinale and P., Torasso, “A comparative analysis of Horn models and Bayesian networks for diagnosis,” in Lecture Notes in Artificial Intelligence, vol. 1321. Springer, 1997, pp. 254–265.
[77] C., Clarotti, “Limitations of minimal cut-set approach in evaluating reliability of systems with repairable components,IEEE Transactions on Reliability, vol. R-30, no. 4, pp. 335–338, 1981.
[78] H., Kumamoto and E., Henley, Probabilistic Risk Assessment and Management for Engineers and Scientists. IEEE Press, 1996.
[79] M., Demichela, N., Piccinini, I., Ciarambino, and S., Contini, “On the numerical solution of fault trees,Reliability Engineering and System Safety, vol. 82, no. 2, pp. 141–147, 2003.
[80] J. D., Andrews, “The use of not logic in fault tree analysis,Quality and Reliability Engineering International, vol. 17, no. 3, pp. 143–150, 2001.
[81] S., Oliva, “Non-coherent fault trees can be misleading,Journal of System Safety, vol. 42, no. 3, pp. 1–5, 2006.
[82] S., Contini, G., Cojazzi, and G., Renda, “On the use of non-coherent fault trees in safety and security studies,Reliability Engineering and System Safety, vol. 93, no. 12, pp. 1886–1895, 2008.
[83] T., Chu and G., Apostolakis, “Methods for probabilistic analysis of noncoherent fault trees,IEEE Transactions on Reliability, vol. R-29, no. 5, pp. 354–360, Dec. 1980.
[84] S., Beeson, “Non coherent fault tree analysis,” Ph.D. Thesis, Loughborough University, 2002.
[85] A., Rauzy and Y., Dutuit, “Exact and truncated computations of prime implicants of coherent and non-coherent fault trees within aralia,Reliability Engineering and System Safety, vol. 58, no. 2, pp. 127–144, 1997.
[86] S., Beeson and J., Andrews, “Birnbaum measure of component importance for non-coherent systems,IEEE Transactions on Reliability, vol. 52, pp. 213–219, 2003.
[87] S., Beeson and J., Andrews, “Importance measures for non-coherent-system analysis,IEEE Transactions on Reliability, vol. 52, pp. 301–310, 2003.
[88] D., Wang and K., Trivedi, “Computing steady-state mean time to failure for non-coherent repairable systems,IEEE Transactions on Reliability, vol. 54, pp. 506–516, 2005.