Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-xbtfd Total loading time: 0 Render date: 2024-11-06T02:27:18.838Z Has data issue: false hasContentIssue false

6 - Fault Tree Analysis

from Part II - Non-State-Space (Combinatorial) Models

Published online by Cambridge University Press:  30 August 2017

Kishor S. Trivedi
Affiliation:
Duke University, North Carolina
Andrea Bobbio
Affiliation:
Università degli Studi del Piemonte Orientale, Italy
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Reliability and Availability Engineering
Modeling, Analysis, and Applications
, pp. 201 - 270
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] IEC 61025, Fault Tree Analysis. IEC Standard No. 61025, 2nd edn., 2006.
[2] A., Hixenbaugh, Fault Tree for Safety. The Boeing Company, 1968.
[3] R., Barlow and F., Proschan, Statistical Theory of Reliability and Life Testing. Holt, Rinehart, and Winston, 1975.
[4] E., Henley and H., Kumamoto, Reliability Engineering and Risk Assessment. Prentice Hall, 1981.
[5] W., Lee, D., Grosh, F., Tillman, and C., Lie, “Fault tree analysis, methods and applications: A review,IEEE Transactions on Reliability, vol. R-34, pp. 194–203, 1985.Google Scholar
[6] S., Contini and A., Poucet, “Advances on fault tree and event tree techniques,” in System Reliability Assessment, eds. A., Colombo and A. S.de, Bustamante. Kluwer Academic P.G., 1990, pp. 77–102.
[7] W., Schneeweiss, The Fault Tree Method. LiLoLe Verlag, 1999.
[8] M., Stamatelatos and W., Vesely, Fault Tree Handbook with Aerospace Applications. NASA Office of Safety and Mission Assurance, 2002, vol. 1.1.
[9] E., Ruijters and M., Stoelinga, “Fault tree analysis: A survey of the state of the art in modeling, analysis and tools,Computer Science Review, vol. 15–16, pp. 29–62, 2015.Google Scholar
[10] M., Malhotra and K., Trivedi, “Power-hierarchy among dependability model types,IEEE Transactions on Reliability, vol. R-43, pp. 493–502, 1994.Google Scholar
[11] M., Malhotra and K., Trivedi, “Dependability modeling using Petri nets,IEEE Transactions on Reliability, vol. R-44, pp. 428–440, 1995.Google Scholar
[12] J., Jürjens, Developing Safety-Critical Systems with UML. Springer, 2003, pp. 360–372.
[13] S., Bernardi, J., Merseguer, and D., Petriu, “Dependability modeling and analysis of software systems specified with UML,” ACM Computing Surveys, vol. 45, no. 1, pp. 2:1–2:48, Dec. 2012.Google Scholar
[14] N., Piccinini and I., Ciarambino, “Operability analysis devoted to the development of logic trees,Reliability Engineering and System Safety, vol. 55, pp. 227–241, 1997.Google Scholar
[15] R., Sahner, K., Trivedi, and A., Puliafito, Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer Academic Publishers, 1996.
[16] K. S., Trivedi and R., Sahner, “SHARPE at the age of twenty-two,SIGMETRICS Perform. Eval. Rev., vol. 36, no. 4, pp. 52–57, Mar. 2009.Google Scholar
[17] W., Schneeweiss, Boolean Functions with Engineering Applications and Computer Programs. Springer Verlag, 1989.
[18] L., Ge, M. van, Asseldonk, and M. van, Galen, “Stochastic fault tree analysis for agropark project appraisal,” in Proc. 21st IFAMA – Internationl Food and Agribusiness Management Association, 2011.
[19] B., Ayyub, Risk Analysis in Engineering and Economics. Chapman and Hall/CRC, 2003.
[20] P., Lacey, “An application of fault tree analysis to the identification and management of risks in government funded human service delivery,” in Proc. 2nd Int. Conf. on Public Policy and Social Sciences, eds. K., Singh and B., Singh, 2011.
[21] G., Youngjung, S., Hyeonju, L., Sungjoo, and P., Yongtae, “Application of fault tree analysis to the service process: Service tree analysis approach,” Journal of Service Management, vol. 20, no. 4, p. 433–454, 2009.Google Scholar
[22] R., Fricks and K., Trivedi, “Importance analysis with Markov chains,” in Proc. IEEE Ann. Reliability and Maintainability Symp., 2003.
[23] G., Bucci, L., Carnevali, and E., Vicario, “A tool supporting evaluation of non-Markovian fault trees,” Proc. Int. Conf. on Quantitative Evaluation of Systems, pp. 115–116, 2008.Google Scholar
[24] J., Vaurio, “Treatment of general dependencies in system fault-tree and risk analysis,IEEE Transactions on Reliability, vol. 51, pp. 278–287, 2002.Google Scholar
[25] A. V., Ramesh, D. W., Twigg, U. R., Sandadi, T. C., Sharma, K. S., Trivedi, and A. K., Somani, “An integrated reliability modeling environment,Reliability Engineering and System Safety, vol. 65, no. 1, pp. 65–75, 1999.Google Scholar
[26] A., Rauzy, “New algorithms for fault tree analysis,Reliability Engineering and System Safety, vol. 40, pp. 203–211, 1993.Google Scholar
[27] R., Sinnamon and J., Andrews, “Improved accuracy in quantitative fault tree analysis,Quality and Reliability Engineering International, vol. 13, pp. 285–292, 1997.Google Scholar
[28] A., Rauzy, “A brief introduction to binary decision diagrams,Journal Européen des Systèmes Automatisés (RAIRO-APII-JESA), vol. 30, no. 8, pp. 1033–1051, 1996.Google Scholar
[29] L., Xing and S., Amari, Binary Decision Diagrams and Extensions for System Reliability Analysis. Wiley-Scrivener, 2015.
[30] Y., Dutuit and A., Rauzy, “A linear-time algorithm to find modules of fault tree,IEEE Transactions on Reliability, vol. 45, pp. 422–425, 1996.Google Scholar
[31] R., Gulati and J., Dugan, “A modular approach for analyzing static and dynamic fault-trees,” in Proc. IEEE Ann. Reliability and Maintainability Symp., 1997, pp. 57–63.Google Scholar
[32] Y., Dutuit and A., Rauzy, “Efficient algorithms to assess components and gates importance in fault tree analysis,Reliability Engineering and System Safety, vol. 72, pp. 213–222, 2000.Google Scholar
[33] S., Contini and V., Matuzas, “New methods to determine the importance measures of initiating and enabling events in fault tree analysis,Reliability Engineering and System Safety, vol. 96, no. 7, pp. 775–784, 2011.Google Scholar
[34] Z., Birnbaum, “On the importance of different components in a multicomponent systems,” in Multivariate Analysis - II, ed. E. P. R., Krishnaiah. Academic Press, 1969, pp. 581–592.
[35] M., Veeraraghavan and K., Trivedi, “An improved algorithm for the symbolic reliability analysis of networks,IEEE Transactions on Reliability, vol. 40, pp. 347–358, 1991.Google Scholar
[36] F. C., Meng, “Relationships of Fussell–Vesely and Birnbaum importance to structural importance in coherent systems,Reliability Engineering and System Safety, vol. 67, no. 1, pp. 55–60, 2000.Google Scholar
[37] K., Hjelmgren, S., Svensson, and O., Hannius, “Reliability analysis of a single-engine aircraft FADEC,” in Proc. Ann. Reliability and Maintainability Symp., 1998, pp. 401–407.Google Scholar
[38] W. E., Smith, K. S., Trivedi, L., Tomek, and J., Ackaret, “Availability analysis of blade server systems,IBM Systems Journal, vol. 47, no. 4, pp. 621–640, 2008.Google Scholar
[39] R., Credle, D., Brown, L., Davis, D., Robertson, T., Ternau, and D., Green, “The cutting edge: IBM E-Server BladeCenter,” IBM Redpaper REDP-3581-01, 2003.
[40] A., Bobbio, S., Bologna, E., Ciancamerla, P., Incalcaterra, C., Kropp, M., Minichino, and E., Tronci, “Advanced techniques for safety analysis applied to the gas turbine control system of ICARO co-generative plant,” in X TESEC (Genova), 2001, pp. 339–350.Google Scholar
[41] D., Nicol, W., Sanders, and K., Trivedi, “Model-based evaluation: From dependability to security,IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 48–65, 2004.Google Scholar
[42] A., Avizienis, J., Laprie, B., Randell, and C., Landwehr, “Basic concepts and taxonomy of dependable and secure computing,IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.Google Scholar
[43] R., Ortalo, Y., Deswarte, andM., Kaaniche, “Experimenting with quantitative evaluation tools for monitoring operational security,IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 633–650, Sep./Oct. 1999.Google Scholar
[44] K. S., Trivedi, D. S., Kim, A., Roy, and D., Medhi, “Dependability and security models,” in Proc. 7th Int. Workshop on Design of Reliable Communication Networks, 2009, pp. 11–20.Google Scholar
[45] L., Pietre-Cambacedes and M., Bouissou, “Cross-fertilization between safety and security engineering,Reliability Engineering and System Safety, vol. 110, pp. 110–126, 2013.Google Scholar
[46] B., Schneier, “Attack trees,Dr. Dobb's Journal of Software Tools, vol. 24, no. 12, pp. 21–29, 1999.Google Scholar
[47] I., Fovino, M., Masera, and A. D., Cian, “Integrating cyber attacks within fault trees,Reliability Engineering and System Safety, vol. 94, pp. 1394–1402, 2009.Google Scholar
[48] A., Roy, D. S., Kim, and S., Trivedi, “Act: Towards unifying the constructs of attack and defense trees,Security and Communication Networks, vol. 3, pp. 1–15, 2011.Google Scholar
[49] J., Byres, M., Franz, and D., Miller, “The use of attack trees in assessing vulnerabilities in SCADA systems,” in Int. Infrastructure Survivability Workshop (IISW'04), Lisbon, 2004.
[50] A., Roy, D. S., Kim, and S., Trivedi, “Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees,” in Proc. Int. Conf. on Dependable Systems and Networks (DSN 2012). IEEE Computer Society, 2012, pp. 1–12.
[51] A., Bobbio, L., Egidi, and R., Terruggia, “A methodology for qualitative/quantitative analysis of weighted attack trees,” in 4th IFAC Workshop on Dependable Control of Discrete Systems (DCDS13), York (UK), 4–6 Sep. 2013, p. 6.
[52] S., Zonouz, H., Khurana, W., Sanders, and T., Yardley, “RRE: A game-theoretic intrusion response and recovery engine,” in IEEE/IFIP Int. Conf. on Dependable Systems Networks, 2009, pp. 439–448.Google Scholar
[53] L., Caldarola, “Fault tree analysis with multistate components,” Kernforschungszentrum Karlsruhe, Tech. Rep. KfK 2761 – EUR 5756e, 1979.
[54] A., Wood, “Multistate block diagrams and fault trees,IEEE Transactions on Reliability, vol. R-34, pp. 236–240, 1985.Google Scholar
[55] Y., Kai, “Multistate fault-tree analysis,Reliability Engineering and System Safety, vol. 28, pp. 1–7, 1990.Google Scholar
[56] M., Veeraraghavan and K. S., Trivedi, “A combinatorial algorithm for performance and reliability analysis using multistate models,IEEE Transactions on Computers, vol. 43, no. 2, pp. 229–234, 1994.Google Scholar
[57] X., Zang, D., Wang, H., Sun, and K., Trivedi, “A BDD-based algorithm for analysis of multistate systems with multistate components,IEEE Transactions on Computers, vol. 52, no. 12, pp. 1608–1618, 2003.Google Scholar
[58] L., Xing and Y., Dai, “A new decision diagram based method for efficient analysis on multi-state systems,IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 3, pp. 161–174, 2009.Google Scholar
[59] S., Amari, L., Xing, A., Shrestha, J., Akers, and K., Trivedi, “Performability analysis of multistate computing systems using multivalued decision diagrams,IEEE Transactions on Computers, vol. 59, no. 10, pp. 1419–1433, 2010.Google Scholar
[60] K., Trivedi, X., Yin, and D. S., Kim, “Recent advances in system reliability,” in Multi-State Availability Modeling in Practice, eds. A., Lisnianski and I., Frenkel. Springer-Verlag, 2011.
[61] A., Bobbio, L., Portinale, M., Minichino, and E., Ciancamerla, “Improving the analysis of dependable systems by mapping fault trees into Bayesian networks,Reliability Engineering and System Safety, vol. 71, pp. 249–260, 2001.Google Scholar
[62] H., Boudali and J. B., Dugan, “A discrete-time Bayesian network reliability modeling and analysis framework,Reliability Engineering and System Safety, vol. 87, pp. 337–349, 2005.Google Scholar
[63] M., Neil and D., Marquez, “Availability modelling of repairable systems using Bayesian networks,Engineering Applications of Artificial Intelligence, vol. 25, no. 4, pp. 698–704, Jun. 2012.Google Scholar
[64] A., Bobbio, D., Codetta-Raiteri, S., Montani, and L., Portinale, “Reliability analysis of systems with dynamic dependencies,” in Bayesian Networks: A Practical Guide to Applications. John Wiley & Sons, 2008, pp. 225–238.
[65] J., Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988.
[66] O., Pourret, P., Naïm, and B., Marcot, Bayesian Networks: A Practical Guide to Applications. John Wiley & Sons, 2008.
[67] J., Torres-Toledano and L., Sucar, “Bayesian networks for reliability analysis of complex systems,” in Lecture Notes in Artificial Intelligence, vol. 1484. Springer Verlag, 1998, pp. 195–206.
[68] H., Langseth and L., Portinale, “Bayesian networks in reliability,Reliability Engineering and System Safety, vol. 92, pp. 92–108, 2007.Google Scholar
[69] P., Weber, G., Medina-Oliva, C., Simon, and B., Iung, “Overview on Bayesian network applications for dependability, risk analysis and maintenance areas,Engineering Applications of Artificial Intelligence, vol. 25, no. 4, pp. 671–682, Jun. 2012.Google Scholar
[70] L., Portinale and D., Codetta-Raiteri, Modeling and Analysis of Dependable Systems: A Probabilistic Graphical Model Perspective. World Scientific, 2015.
[71] J. B., Dugan, S., Bavuso, and M., Boyd, “Fault-trees and Markov models for reliability analysis of fault-tolerant digital systems,Reliability Engineering and System Safety, vol. 39, pp. 291–307, 1993.Google Scholar
[72] G., Cooper, “The computation complexity of probabilistic inference using Bayesian belief networks,Artificial Intelligence, vol. 33, pp. 393–405, 1990.Google Scholar
[73] N., Zhang and D., Poole, “Exploiting causal independence in Bayesian network inference,Journal of Artifical Intelligence Research, vol. 5, pp. 301–328, 1996.Google Scholar
[74] A., Moslehl, D. M., Rasmuson, and F. M., Marshall, Guidelines on Modeling Common-Cause Failures in Probabilistic Risk Assessment, NUREG/CR-5485. U.S. Nuclear Regulatory Commission, 1998.
[75] D., Codetta-Raiteri, A., Bobbio, S., Montani, and L., Portinale, “A dynamic Bayesian network based framework to evaluate cascading effects in power grids,Engineering Applications of Artificial Intelligence, vol. 25, pp. 683–697, 2012.Google Scholar
[76] L., Portinale and P., Torasso, “A comparative analysis of Horn models and Bayesian networks for diagnosis,” in Lecture Notes in Artificial Intelligence, vol. 1321. Springer, 1997, pp. 254–265.
[77] C., Clarotti, “Limitations of minimal cut-set approach in evaluating reliability of systems with repairable components,IEEE Transactions on Reliability, vol. R-30, no. 4, pp. 335–338, 1981.Google Scholar
[78] H., Kumamoto and E., Henley, Probabilistic Risk Assessment and Management for Engineers and Scientists. IEEE Press, 1996.
[79] M., Demichela, N., Piccinini, I., Ciarambino, and S., Contini, “On the numerical solution of fault trees,Reliability Engineering and System Safety, vol. 82, no. 2, pp. 141–147, 2003.Google Scholar
[80] J. D., Andrews, “The use of not logic in fault tree analysis,Quality and Reliability Engineering International, vol. 17, no. 3, pp. 143–150, 2001.Google Scholar
[81] S., Oliva, “Non-coherent fault trees can be misleading,Journal of System Safety, vol. 42, no. 3, pp. 1–5, 2006.Google Scholar
[82] S., Contini, G., Cojazzi, and G., Renda, “On the use of non-coherent fault trees in safety and security studies,Reliability Engineering and System Safety, vol. 93, no. 12, pp. 1886–1895, 2008.Google Scholar
[83] T., Chu and G., Apostolakis, “Methods for probabilistic analysis of noncoherent fault trees,IEEE Transactions on Reliability, vol. R-29, no. 5, pp. 354–360, Dec. 1980.Google Scholar
[84] S., Beeson, “Non coherent fault tree analysis,” Ph.D. Thesis, Loughborough University, 2002.
[85] A., Rauzy and Y., Dutuit, “Exact and truncated computations of prime implicants of coherent and non-coherent fault trees within aralia,Reliability Engineering and System Safety, vol. 58, no. 2, pp. 127–144, 1997.Google Scholar
[86] S., Beeson and J., Andrews, “Birnbaum measure of component importance for non-coherent systems,IEEE Transactions on Reliability, vol. 52, pp. 213–219, 2003.Google Scholar
[87] S., Beeson and J., Andrews, “Importance measures for non-coherent-system analysis,IEEE Transactions on Reliability, vol. 52, pp. 301–310, 2003.Google Scholar
[88] D., Wang and K., Trivedi, “Computing steady-state mean time to failure for non-coherent repairable systems,IEEE Transactions on Reliability, vol. 54, pp. 506–516, 2005.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×