Foreword |
|
xiii | |
Preface |
|
xvii | |
|
Fundamentals of Component and System Reliability and Review of Software Reliability |
|
|
1 | (77) |
|
Functions of Importance in Reliability |
|
|
1 | (5) |
|
Hazard Rate Functions in Reliability |
|
|
6 | (2) |
|
Common Distributions and Random Number Generations |
|
|
8 | (25) |
|
Uniform (Rectangular) p.d.f |
|
|
8 | (2) |
|
|
10 | (1) |
|
Negative Exponential p.d.f., Pareto, and Power Functions |
|
|
11 | (2) |
|
Gamma, Erlang, and Chi-Square p.d.f.'s |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Two- and Three-Parameter (Sahinoglu--Libby) Beta p.d.f.'s |
|
|
17 | (3) |
|
|
20 | (1) |
|
Bernoulli, Binomial, and Multinomial p.m.f.'s |
|
|
20 | (1) |
|
|
21 | (1) |
|
Negative Binomial and Pascal p.m.f.'s |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
25 | (2) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
Extreme Value (Gumbel) p.d.f.'s |
|
|
30 | (1) |
|
Summary of the Distributions and Relationships Most Commonly Used |
|
|
31 | (2) |
|
Life Testing for Component Reliability |
|
|
33 | (7) |
|
Estimation Methods for Complete Data |
|
|
33 | (3) |
|
Estimation Methods for Incomplete Data |
|
|
36 | (4) |
|
Redundancy in System Reliability |
|
|
40 | (5) |
|
Series System Reliability |
|
|
40 | (1) |
|
Active Parallel Redundancy |
|
|
41 | (1) |
|
|
42 | (2) |
|
Other Redundancy Limitations: Common-Mode Failures and Load Sharing |
|
|
44 | (1) |
|
Review of Software Reliability Growth Models |
|
|
45 | (33) |
|
Software Reliability Models in the Time Domain |
|
|
48 | (1) |
|
Classification of Reliability Growth Models |
|
|
49 | (16) |
|
Appendix 1A: 500 Computer-Generated Random Numbers |
|
|
65 | (1) |
|
|
66 | (5) |
|
|
71 | (7) |
|
Software Reliability Modeling with Clustered Failure Data and Stochastic Measures to Compare Predictive Accuracy of Failure-Count Models |
|
|
78 | (41) |
|
Software Reliability Models Using the Compound Poisson Model |
|
|
78 | (21) |
|
Notation and Introduction |
|
|
79 | (1) |
|
Background and Motivation |
|
|
80 | (1) |
|
Maximum Likelihood Estimation in the Poisson^Geometric Model |
|
|
81 | (1) |
|
Nonlinear Regression Estimation in the Poisson^Geometric Model |
|
|
82 | (9) |
|
Calculation of Forecast Quality and Comparison of Methods |
|
|
91 | (5) |
|
Discussion and Conclusions |
|
|
96 | (3) |
|
Stochastic Measures to Compare Failure-Count Reliability Models |
|
|
99 | (20) |
|
Introduction and Motivation |
|
|
99 | (1) |
|
|
100 | (1) |
|
Model, Data, and Computational Formulas |
|
|
101 | (3) |
|
Prior Distribution Approach |
|
|
104 | (2) |
|
Applications to Data Sets and Computations |
|
|
106 | (4) |
|
Discussion and Conclusions |
|
|
110 | (3) |
|
|
113 | (3) |
|
|
116 | (3) |
|
Quantitative Modeling for Security Risk Assessment |
|
|
119 | (53) |
|
Decision Tree Model to Quantify Risk |
|
|
119 | (12) |
|
|
119 | (1) |
|
|
120 | (2) |
|
Quantitative Security Meter Model |
|
|
122 | (2) |
|
Model Application and Results |
|
|
124 | (3) |
|
Modifying the Quantitative Model for Qualitative Data |
|
|
127 | (1) |
|
Hybrid Security Meter Model for Both Quantitative and Qualitative Data |
|
|
127 | (2) |
|
Simulation Study and Conclusions |
|
|
129 | (2) |
|
Bayesian Applications for Prioritizing Software Maintenance |
|
|
131 | (7) |
|
|
131 | (1) |
|
Bayesian Rule in Statistics and Applications for Software Maintenance |
|
|
132 | (3) |
|
Another Bayesian Application for Software Maintenance |
|
|
135 | (2) |
|
Monte Carlo Simulation to Verify the Bayesian Analysis Proposed |
|
|
137 | (1) |
|
Discussion and Conclusions |
|
|
137 | (1) |
|
Quantitative Risk Assessment for Nondisjoint Vulnerabilities and Nondisjoint Threats |
|
|
138 | (4) |
|
Motivation Behind the Disjoint Notion of Vulnerabilities and Threats |
|
|
138 | (1) |
|
Fundamental Probability Laws of Independence, Conditionality, and Disjointness |
|
|
138 | (1) |
|
Security Meter Modified for Nondisjoint Vulnerabilities and Disjoint Threats |
|
|
139 | (2) |
|
Security Meter Modified for Nondisjoint Vulnerabilities and Nondisjoint Threats |
|
|
141 | (1) |
|
Discussion and Conclusions |
|
|
142 | (1) |
|
Simple Statistical Design to Estimate the Security Meter Model Input Data |
|
|
142 | (8) |
|
Estimating the Input Parameters in the Security Meter Model |
|
|
143 | (1) |
|
Statistical Formulas Used to Estimate Inputs in the Security Meter Model |
|
|
144 | (1) |
|
Numerical Example of the Statistical Design for the Security Meter Model |
|
|
145 | (2) |
|
Discrete Event (Dynamic) Simulation |
|
|
147 | (1) |
|
Monte Carlo (Static) Simulation |
|
|
147 | (1) |
|
Risk Management Using the Security Meter Model |
|
|
148 | (1) |
|
Discussion and Conclusions |
|
|
149 | (1) |
|
Statistical Inference to Quantify the Likelihood of Lack of Privacy |
|
|
150 | (4) |
|
Introduction: What Is Privacy? |
|
|
150 | (1) |
|
How to Quantify Lack of Privacy |
|
|
151 | (1) |
|
Numerical Applications for a Privacy Risk Management Study |
|
|
152 | (2) |
|
Discussion and Conclusions |
|
|
154 | (1) |
|
Appendix 3A: Comparison of Various Risk Assessment Approaches and CINAPEAAA |
|
|
154 | (2) |
|
Appendix 3B: Brief Introduction to Encryption, Decryption, and Types |
|
|
156 | (3) |
|
Appendix 3C: Attack Trees |
|
|
159 | (2) |
|
Appendix 3D: Capabilities-Based Attack Tree Analysis |
|
|
161 | (1) |
|
Appendix 3E: Time-to-Defeat Model |
|
|
162 | (2) |
|
|
164 | (3) |
|
|
167 | (5) |
|
Stopping Rules in Software Testing |
|
|
172 | (59) |
|
Effort-Based Empirical Bayesian Stopping Rule |
|
|
173 | (32) |
|
Stopping Rule in Test Case--Based (Effort) Models |
|
|
173 | (1) |
|
Introduction and Motivation |
|
|
174 | (3) |
|
Notation, Compound Poisson Distribution, and Empirical Bayes Estimation |
|
|
177 | (5) |
|
Stopping Rule Proposed for Use in Software Testing |
|
|
182 | (3) |
|
|
185 | (3) |
|
Discussion and Conclusions |
|
|
188 | (3) |
|
Appendix 4A: Analysis Tables |
|
|
191 | (2) |
|
Appendix 4B: Comparison of the Proposed CP Rule with Other Stopping Rules |
|
|
193 | (7) |
|
Appendix 4C: MESAT-1 Output Screenshots and Graphs |
|
|
200 | (5) |
|
Stopping Rule for High-Assurance Software Testing in Business |
|
|
205 | (10) |
|
|
205 | (1) |
|
|
205 | (1) |
|
Typical SDLC Testing Management |
|
|
206 | (1) |
|
|
206 | (2) |
|
|
208 | (5) |
|
Discussion and Conclusions |
|
|
213 | (2) |
|
Bayesian Stopping Rule for Testing in the Time Domain |
|
|
215 | (16) |
|
|
215 | (1) |
|
Review of the Compound Poisson Process |
|
|
216 | (1) |
|
|
217 | (1) |
|
Bayes Analysis for the Poisson^Geometric Model |
|
|
218 | (2) |
|
Empirical Bayesian Stopping Rule |
|
|
220 | (1) |
|
|
220 | (1) |
|
Discussion and Conclusions |
|
|
221 | (1) |
|
Appendix 4D: MESAT-2 Applications and Results |
|
|
221 | (4) |
|
|
225 | (4) |
|
|
229 | (2) |
|
Availability Modeling Using the Sahinoglu--Libby Probability Distribution Function |
|
|
231 | (26) |
|
|
232 | (1) |
|
Introduction and Motivation |
|
|
233 | (1) |
|
Sahinoglu-Libby Probability Model Formulation |
|
|
234 | (1) |
|
Bayes Estimators for Various Informative Priors and Loss Functions |
|
|
235 | (4) |
|
Squared-Error Loss Function |
|
|
236 | (1) |
|
Absolute-Error Loss Function |
|
|
236 | (1) |
|
Weighted Squared-Error Loss Function |
|
|
237 | (2) |
|
Availability Calculations for Simple Parallel and Series Networks |
|
|
239 | (4) |
|
Discussion and Conclusions |
|
|
243 | (14) |
|
Appendix 5A: Derivation of the Sahinoglu--Libby p.d.f. |
|
|
247 | (4) |
|
Appendix 5B: Derivation of the Bayes Estimator for Weighted Squared-Error Loss |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (4) |
|
Reliability Block Diagramming in Complex Systems |
|
|
257 | (52) |
|
Introduction and Motivation |
|
|
258 | (1) |
|
Simple Illustrative Example |
|
|
259 | (1) |
|
Compression Algorithm and Various Applications |
|
|
260 | (5) |
|
Hybrid Tool to Compute Reliability for Complex Systems |
|
|
265 | (3) |
|
More Supporting Examples for the Hybrid Form |
|
|
268 | (1) |
|
New Polish Decoding (Decompression) Algorithm |
|
|
268 | (3) |
|
|
271 | (4) |
|
Overlap Ingress--Egress Reliability Method |
|
|
271 | (3) |
|
Overlap Ingress--Egress Reliability Algorithm |
|
|
274 | (1) |
|
Multistate System Reliability Evaluation |
|
|
275 | (6) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Simple Parallel--Series System |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (2) |
|
Discussion and Conclusions |
|
|
281 | (28) |
|
Appendix 6A: Overlap Algorithm Described |
|
|
282 | (3) |
|
Appendix 6B: Overlap Ingress--Egress Reliability Algorithm Applied, Example 1 |
|
|
285 | (13) |
|
Appendix 6C: Overlap Ingress--Egress Reliability Algorithm Applied, Example 2 |
|
|
298 | (5) |
|
|
303 | (3) |
|
|
306 | (3) |
Index |
|
309 | |