Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240500080-10.doi: 10.11896/jsjkx.240500080
• Computer Software & Architecture • Previous Articles Next Articles
XUE Wenyao, WANG Yichen, REN Qingwei
CLC Number:
[1]KURIAN E,BRAIONE P,BRIOLA D,et al.Automated test case generation for safety-critical software inscade[C]//2023 IEEE/ACM 45th International Conference on Software Engineering:Software Engineering in Practice(ICSE-SEIP).IEEE,2023:483-494. [2]HENDERSON K,SALADO A.Value and benefits of model‐based systems engineering(MBSE):Evidence from the literature[J].Systems Engineering,2021,24(1):51-66. [3]MAEIKA D,BUTLERIS R.MBSEsec:Model-based systemsengineering method for creating secure systems[J].Applied Sciences,2020,10(7):2574. [4]BOMBARDA A,BONFANTI S,GARGANTINI A,et al.RATE:A model‐based testing approach that combines model refinement and test execution[J].Software Testing,Verification and Reliability,2023,33(2):e1835. [5]ZAFAR M N,AFZAL W,ENOIU E.Towards a workflow for model-based testing of embedded systems[C]//Proceedings of the 12th International Workshop on Automating TEST Case Design,Selection,and Evaluation.2021:33-40. [6]TIAN Y,YIN B,LI C.A model-based test cases generationmethod for spacecraft software[C]//2021 8th International Conference on Dependable Systems and Their Applications(DSA).IEEE,2021:373-382. [7]KARLSSON V A,ALMASRI A,ENOIU E P,et al.Automation of the creation and execution of system level hardware-in-loop tests through model-based testing[C]//Proceedings of the 13th International Workshop on Automating Test Case Design,Selection and Evaluation.2022:9-16. [8]PUNNOOSE S,NANDA M,ERABHOVI N.An Adoption ofAutomation Framework for Model-Based Testing to System Testing for Airborne Safety Critical Systems[C]//2023 IEEE AUTOTESTCON.IEEE,2023:1-5. [9]OMG.UNIFIED MODELING LANGUAGE SPECIFICATION2[EB/OL].(2024-04-15) [2024-05-20].https://www.uml.org. [10]OMG.Unified Modeling Language:OMG UML Version 2.5.1[S/OL].[2024-05-20].https://www.omg.org/spec/UML/2.5.1/PDF. [11]OMG.MODELING AND ANALYSIS OF REAL-TIME AND EMBEDDEDSYSTEMS[EB/OL].(2023-11-19)[2024-05-20].https://www.omg.org/omgmarte. [12]OMG.Profile for MARTE:Modeling and Analysis of Real-Time Embedded Systems Version 1.3[S/OL].[2024-05-20].https://www.omg.org/spec/MARTE/1.3/PDF. [13]HU X,ZHUANG Y,ZHANG F.A security modeling and verification method of embedded software based on Z and MARTE[J].Computers & Security,2020,88:101615. [14]ZHONG D,SUN R,GONG H,et al.System-theoretic processanalysis based onSysML/MARTE and NuSMV[J].Applied Sciences,2022,12(3):1671. [15]XU J,ZHOU Q,DU J,et al.A temporal analysis algorithmbased on the DFT-MARTE model [J].Computer Engineering and Design,2024,45(1):120-129. [16]WU PP,WU Z X,TANG W B.Real-time Performance Analysis of Intelligent Unmanned Vehicle System Based on Absorbing Markov Chain[J].Computer Science,2021,48(S2):147-153. [17]NANCY G.LEVESON.Engineering a safer world:systemsthinking applied tosafety[M].Cambridge:The MIT Press,2011:89-100. [18]NANCY G L,JOHN P T.STPA Handbook:MIT-STAMP-001[EB/OL].(2018-03)[2024-05-21].http://psas.scripts.mit.edu/home/get_file.php?name=STPA_handbook.pdf. [19]ZHANG Y,DONG C,GUO W,et al.Systems theoretic accident model and process(STAMP):A literaturereview[J].Safety Science,2022,152:105596. [20]CHAAL M,BANDA O A V,GLOMSRUD J A,et al.A framework to model the STPA hierarchical control structure of an autonomousship[J].Safety Science,2020,132:104939. [21]BENSACI C,ZENNIR Y,POMORSKI D,et al.Collision hazard modeling and analysis in a multi-mobile robots system transportation task with STPA and SPN[J].Reliability Engineering & System Safety,2023,234:109138. [22]LIU J,DONG L,CHEN X,et al.Analysis of causative factors in intelligent avionics systems based on improved STPA-DEMATEL [J/OL].Systems Engineering and Electronics:1-15[2024-05-20].Available from:http://kns.cnki.net/kcms/detail/11.2422.TN.20231031.1645.008.html. [23]BECKER C,VAN EIKEMA HOMMES Q.Transportation systems safety hazard analysis tool(SafetyHAT) user guide(version 1.0)[R/OL].(2014-03-24)[2024-05-20].https://rosap.ntl.bts.gov/view/dot/12034/dot_12034_DS1.pdf. |
[1] | SHAO Wenxin, YANG Zhibin, LI Wei, ZHOU Yong. Natural Language Requirements Based Approach for Automatic Test Cases Generation of SCADE Models [J]. Computer Science, 2024, 51(7): 29-39. |
[2] | DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132. |
[3] | YANG Zhi-bin, YANG Yong-qiang, YUAN Sheng-hao, ZHOU Yong, XUE Lei, CHENG Gao-hui. Terminology Recommendation and Requirement Classification Method for Safety-critical Software [J]. Computer Science, 2021, 48(5): 32-44. |
[4] | WU Pei-pei, WU Zhao-xian, TANG Wen-bing. Real-time Performance Analysis of Intelligent Unmanned Vehicle System Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(11A): 147-153. |
[5] | LI Ai-ling, ZHANG Feng-li, GAO Qiang, WANG Rui-jin. Trajectory Next Footprint Prediction Model Based on Adaptive Timestamp and Multi-scale Feature Extraction [J]. Computer Science, 2021, 48(11A): 191-197. |
[6] | LV Xiao-hu, HAN Xiao-dong, GONG Jiang-lei, WANG Zhi-jie, LIU Xiao-kun. Systemic Muti-factors Based Verification Method for Safety-critical Software [J]. Computer Science, 2019, 46(9): 156-161. |
[7] | WANG Bin, MA Jun-jie, FANG Xin-xiu, WEI Tian-you. Association Rule Mining Algorithm Based on Timestamp and Vertical Format [J]. Computer Science, 2019, 46(10): 71-76. |
[8] | LIU Jie, WANG Gui-ling, ZUO Xiao-jiang. Incremental Data Extraction Model Based on Variable Time-window [J]. Computer Science, 2018, 45(11): 204-209. |
[9] | HU Xiang, JIAO Li and CHAI Ye-sheng. Transforming UML to GSPN for Performance Analysis [J]. Computer Science, 2016, 43(11): 49-54. |
[10] | CHAI Ye-sheng, ZHU Xue-yang, YAN Rong-jie and ZHANG Guang-quan. MARTE Models Based System Reliability Prediction [J]. Computer Science, 2015, 42(12): 82-86. |
[11] | NI Shui-mei,CAO Zi-ning and LI Xin-lei. Model Checking for Real-time Systems with Data Constraints [J]. Computer Science, 2014, 41(5): 254-262. |
[12] | JI Ming,HUANG Zhi-qiu , ZHU Yi , WANG Shan-shan , SHEN Guo-hua. MDA-based Method on Resource Modeling and Model Transformation of Real-time Software [J]. Computer Science, 2011, 38(8): 136-141. |
[13] | PENG Lin,XIE Lun-guo,ZHANG Xiao-qiang. Vector Timest Based Software Transactional Memory Algorithm [J]. Computer Science, 2010, 37(5): 282-286. |
[14] | ZHOU Ti,LI Zhon-jun,WANG Zhi-yong,WANG Jin-ying. Survey on Modelling and Verification of Time Sensitive Security Protocol [J]. Computer Science, 2009, 36(8): 3-7. |
[15] | . [J]. Computer Science, 2009, 36(5): 138-141. |
|