@inproceedings(alrajeh2018combining, author = {Dalal Alrajeh and Hana Chockler and Joseph~Y Halpern}, year = {2018}, title = {Combining Experts\IeC{\textquoteright} Causal Judgments}, booktitle = {Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)}, ) @article(anderson1997act, author = {John~R Anderson and Michael Matessa and Christian Lebiere}, year = {1997}, title = {ACT-R: A theory of higher level cognition and its relation to visual attention}, journal = {Human-Computer Interaction}, volume = {12}, number = {4}, pages = {439--462}, doi = {10.1016/0010-0285(80)90005-5}, ) @incollection(annett2003hierarchical, author = {John Annett}, year = {2003}, title = {Hierarchical task analysis}, booktitle = {Handbook of cognitive task design}, publisher = {CRC Press}, pages = {41--60}, doi = {10.1201/9781410607775.ch2}, ) @incollection(bruns1993validating, author = {Glenn Bruns and Stuart Anderson}, year = {1993}, title = {Validating safety models with fault trees}, booktitle = {SAFECOMP\IeC{\textquoteright}93}, publisher = {Springer}, pages = {21--30}, doi = {10.1007/978-1-4471-2061-2\_3}, ) @article(friedenberg2018combining, author = {Meir Friedenberg and Joseph~Y Halpern}, year = {2018}, title = {Combining the Causal Judgments of Experts with Possibly Different Focus Areas}, url = {http://www.cs.cornell.edu/home/halpern/papers/focus.pdf}, ) @misc(jeep, author = {Andy Greenberg}, year = {2015}, title = {{Hackers Remotely Kill a Jeep on the Highway\IeC{\textemdash}With Me in It}}, howpublished = {\url{https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/}}, note = {[Online; acc. 2019-01-24]}, ) @article(grossman2001killing, author = {Dave Grossman}, year = {2001}, title = {On killing. II: The psychological cost of learning to kill.}, journal = {International Journal of Emergency Mental Health}, volume = {3}, number = {3}, pages = {137--144}, ) @inproceedings(halpern2015, author = {Joseph~Y Halpern}, year = {2015}, title = {A Modification of the {H}alpern-{P}earl Definition of Causality.}, booktitle = {International Joint Conference on Artificial Intelligence}, pages = {3022--3033}, url = {https://www.aaai.org/ocs/index.php/IJCAI/IJCAI15/paper/view/11058/11085}, ) @book(halpern2016actual, author = {Joseph~Y Halpern}, year = {2016}, title = {Actual causality}, publisher = {MiT Press}, doi = {10.7551/mitpress/10809.001.0001}, ) @article(halpern2005causes1, author = {Joseph~Y. Halpern and Judea Pearl}, year = {2005}, title = {Causes and Explanations: A Structural-Model Approach. Part I: Causes}, journal = {The British Journal for the Philosophy of Science}, volume = {56}, number = {4}, pages = {843--887}, doi = {10.1093/bjps/axi147}, ) @article(halpern2005causes2, author = {Joseph~Y. Halpern and Judea Pearl}, year = {2005}, title = {{Causes and Explanations: A Structural-Model Approach. Part II: Explanations}}, journal = {The British Journal for the Philosophy of Science}, volume = {56}, number = {4}, pages = {889--911}, doi = {10.1093/bjps/axi148}, ) @unpublished(nfm, author = {Amjad Ibrahim and Severin Kacianka and Alexander Pretschner and Charles Hartsell and Gabor Karsai}, year = {submitted}, title = {Practical Causal Models for Cyber-Physical Systems}, ) @article(isermann2002fault, author = {Rolf Isermann and Ralf Schwarz and Stefan Stolzl}, year = {2002}, title = {Fault-tolerant drive-by-wire systems}, journal = {IEEE Control Systems}, volume = {22}, number = {5}, pages = {64--81}, doi = {10.1109/MCS.2002.1035218}, ) @inproceedings(kacianka2018understanding, author = {Severin Kacianka and Alexander Pretschner}, year = {2018}, title = {Understanding and Formalizing Accountability for Cyber-Physical Systems}, booktitle = {2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)}, organization = {IEEE}, pages = {3165--3170}, doi = {10.1109/SMC.2018.00536}, ) @(kassner2011hierarchical, author = {Astrid Kassner and Martin Baumann and Lars Weber}, year = {2011}, title = {A Hierarchical Task Analysis of Merging onto a Freeway---Comparison of Driver's and Driver Model's Task Representation}, doi = {10.1007/978-88-470-1821-1\_31}, ) @article(kordy2014dag, author = {Barbara Kordy and Pi{\`e}tre-Cambac{\'e}d{\`e}s, Ludovic and Patrick Schweitzer}, year = {2014}, title = {DAG-based attack and defense modeling: Don't miss the forest for the attack trees}, journal = {Computer science review}, volume = {13}, pages = {1--38}, doi = {10.1016/j.cosrev.2014.07.001}, ) @article(liu2006driver, author = {YF~Liu and ZH~Wu}, year = {2006}, title = {Driver behavior modeling in ACT-R cognitive architecture}, journal = {Zhejiang Daxue Xuebao (Gongxue Ban)}, volume = {40}, number = {10}, pages = {1657--1662}, ) @(ludtke2010cognitive, author = {Andreas L{\"u}dtke and Jan-Patrick Osterloh and Tina Mioch and Frank Rister and Rosemarijn Looije}, year = {2010}, title = {Cognitive Modelling of Pilot Errors and Error Recovery in Flight Management Tasks}, doi = {10.1007/978-3-642-03655-2\_59}, ) @inproceedings(ludtke2009modeling, author = {Andreas L{\"u}dtke and Lars Weber and Jan-Patrick Osterloh and Bertram Wortelen}, year = {2009}, title = {Modeling Pilot and Driver Behavior for Human Error Simulation}, editor = {Vincent~G. Duffy}, booktitle = {Digital Human Modeling}, publisher = {Springer Berlin Heidelberg}, address = {Berlin, Heidelberg}, pages = {403--412}, doi = {10.1007/978-3-642-02809-0\_43}, ) @inproceedings(mauw2005foundations, author = {Sjouke Mauw and Martijn Oostdijk}, year = {2005}, title = {Foundations of Attack Trees}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, pages = {186--198}, doi = {10.1007/11734727\_17}, ) @book(pearl2018book, author = {Judea Pearl and Dana Mackenzie}, year = {2018}, title = {The Book of Why}, publisher = {New York, NY: Basic Books}, ) @article(ruijters2015fault, author = {Enno Ruijters and Mari{\"e}lle Stoelinga}, year = {2015}, title = {Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools}, journal = {Computer science review}, volume = {15}, pages = {29--62}, doi = {10.1016/j.cosrev.2015.03.001}, ) @article(salvucci2006modeling, author = {Dario~D Salvucci}, year = {2006}, title = {Modeling driver behavior in a cognitive architecture}, journal = {Human factors}, volume = {48}, number = {2}, pages = {362--380}, doi = {10.1037/0096-1523.29.2.363}, ) @article(schneier1999attack, author = {Bruce Schneier}, year = {1999}, title = {{Attack Trees - Modeling security threats}}, journal = {{Dr. Dobb's Journal}}, url = {http://www.schneier.com/paper-attacktrees-ddj-ft.html}, ) @book(schneier2004secrets, author = {Bruce Schneier}, year = {2004}, title = {Secrets and lies - digital security in a networked world: with new information about post-9/11 security}, publisher = {Wiley}, ) @misc(vesely1981fault, author = {W.E. Vesely and F.F. Goldberg and N.H. Roberts and D.F. Haasl}, year = {1981}, title = {Fault Tree Handbook}, ) @article(weber2009modellierung, author = {Lars Weber and Martin Baumann and Andreas L{\"u}dtke and Rike Steenken}, year = {2009}, title = {Modellierung von Entscheidungen beim Einf{\"a}deln auf die Autobahn}, journal = {To appear: Fortschritts-Berichte VDI: Der Mensch im Mittelpunkt technischer Systeme}, volume = {8}, )