{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T12:40:06Z","timestamp":1746362406776,"version":"3.40.4"},"reference-count":40,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2014]]},"DOI":"10.1587\/transinf.2013edp7339","type":"journal-article","created":{"date-parts":[[2014,8,31]],"date-time":"2014-08-31T23:32:28Z","timestamp":1409527948000},"page":"2356-2370","source":"Crossref","is-referenced-by-count":1,"title":["Investigating System Survivability from a Probabilistic Perspective"],"prefix":"10.1587","volume":"E97.D","author":[{"given":"Yongxin","family":"ZHAO","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Yanhong","family":"HUANG","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Qin","family":"LI","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Huibiao","family":"ZHU","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Jifeng","family":"HE","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Jianwen","family":"LI","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Xi","family":"WU","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] A. Avizienis, J. Laprie, and B. Randell, Fundamental Concepts of Computer System Dependability, IARP\/IEEE-RAS Workshop on Robot Dependability, Technological Challenge of Dependable Robots in Human Environment, Seoul, Korea, May 2001."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] R.E. Ball, The Fundamentals of Aircraft Combat Survivability Analysis and Design, American Insitute of Aeronautics and Astronautics (AIAA), 1985.","DOI":"10.2514\/4.861239"},{"key":"3","unstructured":"[3] C.A.R. Hoare, Communicating Sequential Processes, Prentice Hall International Series in Computer Science, 1985."},{"key":"4","unstructured":"[4] C.A.R. Hoare and J. He, Unifying Theories of Programming, Prentice Hall International Series in Computer Science, 1998."},{"key":"5","unstructured":"[5] C.C. Morgan, Programming from Specifications, 2nd ed., Prentice-Hall, Englewood Cliffs, NJ, 1994."},{"key":"6","unstructured":"[6] C.C. Morgan, A. Mclver, K. Seidel, and J.W. Sanders, Refinement oriented probability for CSP, Technical Report PRG-TR-12-94, Programming Research Group, Aug. 1994."},{"key":"7","unstructured":"[7] C.C. Morgan, A. Mclver, K. Seidel, and J.W. Sanders, \u201cProbabilistic predicate transformers,\u201d Technical Report PRG-TR-5-95, Programming Research Group, Jan. 1995."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] C. Jones and G. Plotkin, \u201cA probabilistic power domain of evaluations,\u201d Proc. Fourth IEEE Symposium on Logic in Computer Science, Cambridge, MA, 186-195, 1989.","DOI":"10.1109\/LICS.1989.39173"},{"key":"9","unstructured":"[9] C. Jones, Probabilistic Non-determinism, Doctoral Thesis, Edinburgh University, also available as Technical Report ECS-LFCS-90-105, 1990."},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] C. Wang, J. Davidson, J. Hill, and J. Knight, \u201cProtection of software-based survivability mechanisms,\u201d 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), July 2001.","DOI":"10.21236\/ADA466288"},{"key":"11","unstructured":"[11] M.S. Deutsch and R. Willis, Software Quality Engineering: A Total Technical and Management Approach, Prentice-Hall, Englewood Cliffs, NJ, 1988."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] E.W. Dijkstra, \u201cGuarded commands, non-determinancy, and formal derivation of programs,\u201d Commun. ACM, vol.18, pp.453-457, 1975.","DOI":"10.1145\/360933.360975"},{"key":"13","unstructured":"[13] E.W. Dijkstra, A Discipline of Programming, Prentice-Hall, Eenglewood Cliffs, NJ, 1976."},{"key":"14","unstructured":"[14] F.W. Lawvere, \u201cThe category of probabilistic mappings,\u201d preprint, 1962."},{"key":"15","unstructured":"[15] J.C. Knight, M. Elder, J. Flinn, and P. Marx, \u201cSummaries of four critical infrastructure systems,\u201d Technical Report CMU \/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, Nov. 1997."},{"key":"16","unstructured":"[16] J.C. Knight, E.A. Struck, and K.J. Sullivan, \u201cTowards a rigorous definition of information system survivability,\u201d DARPA Information Survivability Conference and Exposition, pp.78-89, 2003."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] J.C. Knight and E.A. Strunk, Achieving Critical System Survivability through Software Architectures, Architecting Dependable Systems II, LNCS 3069, pp.51-78, Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-25939-8_3"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] J. He, \u201cSimulation and process refinement,\u201d Form Aspect Comp, vol.229-241, 1989.","DOI":"10.1007\/BF01887207"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] J. He, K. Seidel, and A. Mclver, \u201cProbabilistic models for the guarded command language,\u201d Science of Computer Programming, vol.28, no.2-3, pp.171-192, 1997.","DOI":"10.1016\/S0167-6423(96)00019-6"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] J. He and C.A.R. Hoare, \u201cLinking theories in probabilistic programming,\u201d Inf. Sci., vol.119, no.3-4, Oct. 205-218, 1999.","DOI":"10.1016\/S0020-0255(99)00015-8"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] J. He and J.W. Sanders, \u201cUnifying probability. Unifying theories of programming,\u201d First International Symposium, UTP 2006, Walworth Castle, County Durham, UK, Feb. 2006.","DOI":"10.1007\/11768173_11"},{"key":"22","unstructured":"[22] J. He, \u201cRefinement and test case generation in Unifying Theory of Programming,\u201d 24th IEEE International Conference on Software Maintenance (ICSM 2008), 2008."},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] J. He, \u201cService refinement,\u201d Science in China Series F: Information Sciences, vol.51, no.6, pp.661-682, 2008.","DOI":"10.1007\/s11432-008-0061-x"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] J. He, \u201cProbabilistic programming with coordination and compensation,\u201d 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, p.1, 2009.","DOI":"10.1109\/SSIRI.2009.73"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] J.M. Morris, \u201cA theoretical basis for stepwise refinement and the programming calculus,\u201d Science of Computer Programming, vol.9, no.3, pp.287-306, 1987.","DOI":"10.1016\/0167-6423(87)90011-6"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] J.R. Rao, \u201cReasoning about probabilistic parallel programs,\u201d ATM Trans. Programming Languages Systems, vol.16, no.3, pp.798-842, 1994.","DOI":"10.1145\/177492.177724"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] K.G. Larsen and A. Skou, \u201cBisimulation through probabilistic testing,\u201d Information and Computation, vol.94, no.1, pp.344-352, 1991.","DOI":"10.1016\/0890-5401(91)90030-6"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] K.J. Sullivan, J.C. Knight, X. Du, and S. Geist, \u201cInformation Survivability Control Systems,\u201d ICSE, pp.184-192, 1999.","DOI":"10.21236\/ADA465530"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] P. Ellison, B.D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, \u201cSurvivable network systems: An emerging discipline,\u201d Technical Report CMU\/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, Nov. 1997.","DOI":"10.21236\/ADA341963"},{"key":"30","unstructured":"[30] R.C. Linger, N.R. Mead, and H.F. Lipson, \u201cRequirements definition for survivable network systems,\u201d ICRE, 0014, Third International Conference on Requirements Engineering (ICRE&apos;98), 1998."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] R. Fagin, J.Y. Halpern, and N. Meggido, \u201cA logic for reasoning about probabilities,\u201d Inform and Comput., vol.87, pp.78-128, 1990.","DOI":"10.1016\/0890-5401(90)90060-U"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] R. Gupta, S.A. Smolka, and S. Bhashar, \u201cOn randomization in sequential and distributed algorithms,\u201d ACM Comput. Surveys, vol.26, no.1, pp.7-86, 1994.","DOI":"10.1145\/174666.174667"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] V.R. Westmark, \u201cA definition for information system survivability,\u201d HICSS, vol.9, 90303a, Proc. 37th Annual Hawaii International Conference on System Sciences (HICSS&apos;04)-Track 9, 2004.","DOI":"10.1109\/HICSS.2004.1265710"},{"key":"34","unstructured":"[34] National Defense Industrial Association Symposium, Proc. Aircraft Survivability 2000, Monterey, CA, Nov. 2000."},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] J. He, H. Zhu, and G. Pu, \u201cA model for BPEL-like languages,\u201d Frontiers of Computer Science in China, vol.1, no.1, pp.9-19, 2007.","DOI":"10.1007\/s11704-007-0002-7"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] A. Koziolek, A. Avritzer, S. Suresh, D.S. Menasche, K.S. Trivedi, and L. Happe, \u201cDesign of distribution automation networks using survivability modeling and power flow equations,\u201d ISSRE 2013, pp.41-50, 2013.","DOI":"10.1109\/ISSRE.2013.6698903"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] A. Avritzer, S. Suresh, D.S. Menasche, R.M.M. Leao, E. de Souza e Silva, M.C. Diniz, K.S. Trivedi, L. Happe, and A. Koziolek, \u201cSurvivability models for the assessment of smart grid distribution automation network designs,\u201d ICPE 2013, pp.241-252, 2013.","DOI":"10.1145\/2479871.2479905"},{"key":"38","doi-asserted-by":"crossref","unstructured":"[38] D.S. Menasche, R.M.M. Leao, E. de Souza e Silva, A. Avritzer, S. Suresh, K.S. Trivedi, R.A. Marie, L. Happe, and A. Koziolek, Survivability analysis of power distribution in smart grids with active and reactive power modeling, SIGMETRICS Performance Evaluation Review, vol.40, no.3, pp.53-57, 2012.","DOI":"10.1145\/2425248.2425260"},{"key":"39","unstructured":"[39] P.E. Heegaard and K.S. Trivedi, \u201cNetwork survivability modeling,\u201d Computer Networks, vol.53, no.8, pp.1215-1234, 2009."},{"key":"40","doi-asserted-by":"crossref","unstructured":"[40] P.E. Heegaard and K.S. Trivedi, Survivability Modeling with Stochastic Reward Nets, Winter Simulation Conference 2009, pp.807-818, 2009.","DOI":"10.1109\/WSC.2009.5429679"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E97.D\/9\/E97.D_2013EDP7339\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T12:13:03Z","timestamp":1746360783000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E97.D\/9\/E97.D_2013EDP7339\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2013edp7339","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2014]]}}}