2016
DOI: 10.1016/j.procs.2016.07.294
|View full text |Cite
|
Sign up to set email alerts
|

System Safety Analysis for Critical System Applications Using Bayesian Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…This provides the benefit of being able to compute inference “omnidirectionally.” [ 17 ]. In this research, three Bayesian networks were considered: Naïve Bayes [ 15 ], Tree Augmented Naïve Bayes (TAN) [ 12 ], and Sons and Spouses (SS) [ 18 ]. First, Naïve Bayes was not used.…”
Section: Methodsmentioning
confidence: 99%
“…This provides the benefit of being able to compute inference “omnidirectionally.” [ 17 ]. In this research, three Bayesian networks were considered: Naïve Bayes [ 15 ], Tree Augmented Naïve Bayes (TAN) [ 12 ], and Sons and Spouses (SS) [ 18 ]. First, Naïve Bayes was not used.…”
Section: Methodsmentioning
confidence: 99%
“…Khakzad et al (2013) presented a dynamic safety analysis method by mapping the bow-tie to BN. Prabhakaran et al (2016) proposed a safety assessment approach for an unmanned aerial vehicle (UAV) safety-critical system to appropriate monitor the safety-critical outputs. This enabled the use of BNs to secure the system and to ensure its fully successful performance.…”
Section: Safety-critical Systemsmentioning
confidence: 99%
“…In this SLR, it is observed that 43 out of 51 BN-based model have used less than 40 nodes. However, the remaining eight have used equal or more than 40, including Xiaoyan et al [65], Song et al [104], Zhiqiang et al [70], Xiqiang et al [85], Barry et al [54], Jiali et al [90], Remya et al [78], and Jinsoo et al [82], 40, 45, 47, 47, 51, 58, 60, and 64, respectively. However, all models that utilized GT and BN simultaneously have used less than 40 nodes in the developed system.…”
Section: Data Sources and Number Of Nodes Used To Construct Bn/gtmentioning
confidence: 99%
“…Mingjing et al [47] Simulation Not Specified Xiaoxue et al [48] Real-time Not Specified Xin et al [49] Real-time Not Specified Meizhi et al [50] Preliminary Not Specified Niamat et al [51] Preliminary Outsider, Insider Chengpeng et al [52] Real-time Not Specified Yi et al [53] Simulation Not Specified Barry et al [54] Preliminary Not Specified Alexandre et al [55] Simulation Outsider Sabarathinam et al [56] Simulation Not Specified Seyedmohsen et al [57] Simulation Not Specified Mario et al [58] Simulation Not Specified Chao et al [59] Preliminary Not Specified Nima et al [60] Real-time Outsider Hui et al [61] Real-time Outsider Xiqiang et al [62] Real-time Not Specified Jamal et al [63] Simulation Not Specified Elvin et al [64] Preliminary Not Specified Xiaoyan et al [65] Real-time Not Specified Ying et al [66] Real-time Outsider Subhojeet et al [67] Simulation Not Specified Huai et al [68] Simulation Not Specified Gabriele et al [69] Preliminary Not Specified Zhiqiang et al [70] Simulation Not Specified Jinsoo et al [71] Real-time Insider Donya et al [72] Preliminary Not Specified Xianyou et al [73] Preliminary Not Specified Galizia et al [74] Simulation Not Specified Francesca et al [75] Simulation Outsider Zhao et al [76] Real-time Not Specified Mark et al [77] Real-time Outsider, Insider Remya et al [78] Simulation Not Specified Xin Chen [79] Simulation Not Specified Mark et al [80] Preliminary Not Specified Martin et al [81] Preliminary Not Specified Jinsoo et al…”
Section: Study Implementation Criteria Threat Actormentioning
confidence: 99%