References
- Brocklehurst , S. , Littlewood , B. , Olovsson , T. and Jonsson , E. 1994 . On measurement of operational security . IEEE Aerospace and Electronic Systems Magazine , 9 : 7 – 16 .
- Brooke , P. J. and Paige , R. F. 2003 . Fault trees for security system design and analysis . Computers and Security , 22 : 256 – 264 .
- Martin , J. 1973 . Security, Accuracy, and Privacy in Computer Systems , Englewood Cliffs, NJ : Prentice-Hall .
- O’Gorman , L. 2003, Comparing passwords, tokens and biometrics for user authentication . Proceedings of the IEEE , 91 : 2021 – 2040 .
- Tanaka , H. , Fan , L. T. , Lai , F. S. and Toguchi , D. 1983 . Fault-tree analysis by fuzzy probability . IEEE Transactions on Reliability , R-32 : 453 – 457 .
- Weber , D. P. Fuzzy fault tree analysis . Proceedings of the 3rd IEEE Conference on Fuzzy Systems , Vol. 3 , pp. 1899 – 1904 . New York : IEEE Press) .
- Rushdi , A. M. 1985 . Uncertainty analysis of fault-tree outputs . IEEE Transactions on Reliability , R-34 : 458 – 462 .
- Rushdi , A. M. and Kafrawy , K. F. 1988 . Uncertainty propagation in fault-tree analysis using an exact method of moments . Microelectronics and Reliability , 28 : 945 – 965 .
- Kafrawy , K. F. and Rushdi , A. M. 1990 . Uncertainty analysis of fault trees with statistically correlated failure data . Microelectronics and Reliability , 30 : 157 – 175 .
- Rushdi , A. M. 1983 . How to hand-check a symbolic reliability expression . IEEE Transactions on Reliability , R-32 : 402 – 408 .
- Trivedi , K. S. 2002 . Probability and Statistics with Reliability Queuing and Computer Science Applications , (2nd edn) , Englewood Cliffs, NJ : Prentice-Hall .
- Gollman , D. 2000 . Computer Security , Chichester, , UK : Wiley .
- Alayed , A. , Furnell , S. M. and Barlaw , I. M. 2002 . “ Addressing internet security vulnerabilities ” . In Security in the Information Society: Visions and Perspectives , Edited by: Ghonaimy , M. A. 121 – 132 . Boston, MA : Kluwer Academic .
- Salah , D. , Aslan , H. K. and El-Hadidi , M. T. 2002 . “ A detection scheme for the SK virus ” . In Security in the Information Society: Visions and Perspectives , Edited by: Ghonaimy , M. A. 171 – 182 . Boston, MA : Kluwer Academic .
- Stallings , W. 2003 . Network and Internetwork Security: Principles and Practice , (3rd edn) , Englewood Cliffs, NJ : Prentice-Hall .
- Anderson , R. J. 2001 . Security Engineering , New York : Wiley .
- Tanenbaum , A. S. 2001 . Modern Operating Systems , Englewood Cliffs, NJ : Prentice-Hall .
- Kaufman , C. , Perlman , R. and Speciner , M. 2002 . Network Security , (2nd edn) , Englewood Cliffs, NJ : Prentice-Hall .
- Ebeling , C. E. 1997 . An Introduction to Reliability and Maintainability Engineering , New York : McGraw-Hill .
- Henley , E. J. and Kumamoto , H. 1981 . Reliability Engineering and Risk Assessment , Englewood Cliffs, NJ : Prentice-Hall .
- Henley , E. J. and Kumamoto , H. 1992 . Probability Risk Assessment: Reliability Engineering Design and Analysis , New York : IEEE Press .
- Kumamoto , H. 1993 . “ Fault tree analysis ” . In New Trends in System Reliability Evaluation, Fundamental Studies in Engineering , Edited by: Misra , K. B. Vol. 16 , 249 – 312 . Amsterdam : Elsevier .
- Bennetts , R. G. 1975 . On the analysis of fault trees . IEEE Transactions on Reliability , R-24 : 194 – 203 .
- Rushdi , A. M. and Abdul-Ghani , A. A. 1993 . A comparison between reliability analyses based primarily on disjointness or statistical independence . Microelectronics and Reliability , 33 : 965 – 978 .
- Abraham , J. A. 1979 . An improved algorithm for network reliability . IEEE Transactions on Reliability , R-28 : 58 – 62 .
- Dotson , W. P. and Gobian , J. O. 1979 . A new analysis technique for probability graphs . IEEE Transactions on Circuits and Systems , CAS-26 : 855 – 865 .
- Rushdi , A. M. 1983 . Symbolic reliability analysis with the aid of the variable-entered Karnaugh maps . IEEE Transactions on Reliability , R-32 : 134 – 139 .
- Veeraraghavan , M. and Trivedi , K. S. 1993 . “ Multiple variable inversion techniques ” . In New Trends in System Reliability Evaluation, Fundamental Studies in Engineering , Edited by: Misra , K. B. Vol. 16 , 39 – 74 . Amsterdam : Elsevier .
- Crama , Y. and Hammer , P. 2004 . Boolean Functions Available online at: http://www.sig.egss.ulg.ac.be/rogp/Crama (accessed 20 March 2004)
- Rushdi , A. M. and Goda , A. S. 1985 . Symbolic reliability analysis via Shannon’s expansion and statistical independence . Microelectronics and Reliability , 25 : 1041 – 1053 .
- Page , L. B. and Perry , J. E. 1989 . Reliability of directed networks using the factoring theorem . IEEE Transactions on Reliability , R-38 : 556 – 562 .
- Yin , L. , Smith , M. A.J. and Trivedi , K. S. 2001 . “ Uncertainty analysis in reliability modeling ” . In Proceedings of the 2001 Annual Reliability and Maintainability Symposium , 229 – 234 . New York : IEEE Press .
- Rushdi , A. M. 1993 . “ Reliability of k-out-of-n, systems ” . In New Trends in System Reliability Evaluation, Fundamental Studies in Engineering , Edited by: Misra , K. B. Vol. 16 , 185 – 227 . Amsterdam : Elsevier .