Dalal Alrajeh, Hana Chockler & Joseph Y Halpern (2018):
Combining ExpertsCausal Judgments.
In: Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18).
John R Anderson, Michael Matessa & Christian Lebiere (1997):
ACT-R: A theory of higher level cognition and its relation to visual attention.
Human-Computer Interaction 12(4),
pp. 439–462,
doi:10.1016/0010-0285(80)90005-5.
John Annett (2003):
Hierarchical task analysis.
In: Handbook of cognitive task design.
CRC Press,
pp. 41–60,
doi:10.1201/9781410607775.ch2.
Glenn Bruns & Stuart Anderson (1993):
Validating safety models with fault trees.
In: SAFECOMP93.
Springer,
pp. 21–30,
doi:10.1007/978-1-4471-2061-2_3.
Andy Greenberg (2015):
Hackers Remotely Kill a Jeep on the HighwayWith Me in It.
https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.
[Online; acc. 2019-01-24].
Dave Grossman (2001):
On killing. II: The psychological cost of learning to kill..
International Journal of Emergency Mental Health 3(3),
pp. 137–144.
Joseph Y. Halpern & Judea Pearl (2005):
Causes and Explanations: A Structural-Model Approach. Part I: Causes.
The British Journal for the Philosophy of Science 56(4),
pp. 843–887,
doi:10.1093/bjps/axi147.
Joseph Y. Halpern & Judea Pearl (2005):
Causes and Explanations: A Structural-Model Approach. Part II: Explanations.
The British Journal for the Philosophy of Science 56(4),
pp. 889–911,
doi:10.1093/bjps/axi148.
Amjad Ibrahim, Severin Kacianka, Alexander Pretschner, Charles Hartsell & Gabor Karsai (submitted):
Practical Causal Models for Cyber-Physical Systems.
Rolf Isermann, Ralf Schwarz & Stefan Stolzl (2002):
Fault-tolerant drive-by-wire systems.
IEEE Control Systems 22(5),
pp. 64–81,
doi:10.1109/MCS.2002.1035218.
Severin Kacianka & Alexander Pretschner (2018):
Understanding and Formalizing Accountability for Cyber-Physical Systems.
In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
IEEE,
pp. 3165–3170,
doi:10.1109/SMC.2018.00536.
Astrid Kassner, Martin Baumann & Lars Weber (2011):
A Hierarchical Task Analysis of Merging onto a Freeway—Comparison of Driver's and Driver Model's Task Representation,
doi:10.1007/978-88-470-1821-1_31.
Barbara Kordy, Ludovic Piètre-Cambacédès & Patrick Schweitzer (2014):
DAG-based attack and defense modeling: Don't miss the forest for the attack trees.
Computer science review 13,
pp. 1–38,
doi:10.1016/j.cosrev.2014.07.001.
YF Liu & ZH Wu (2006):
Driver behavior modeling in ACT-R cognitive architecture.
Zhejiang Daxue Xuebao (Gongxue Ban) 40(10),
pp. 1657–1662.
Andreas Lüdtke, Jan-Patrick Osterloh, Tina Mioch, Frank Rister & Rosemarijn Looije (2010):
Cognitive Modelling of Pilot Errors and Error Recovery in Flight Management Tasks,
doi:10.1007/978-3-642-03655-2_59.
Andreas Lüdtke, Lars Weber, Jan-Patrick Osterloh & Bertram Wortelen (2009):
Modeling Pilot and Driver Behavior for Human Error Simulation.
In: Vincent G. Duffy: Digital Human Modeling.
Springer Berlin Heidelberg,
Berlin, Heidelberg,
pp. 403–412,
doi:10.1007/978-3-642-02809-0_43.
Sjouke Mauw & Martijn Oostdijk (2005):
Foundations of Attack Trees.
In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers,
pp. 186–198,
doi:10.1007/11734727_17.
Judea Pearl & Dana Mackenzie (2018):
The Book of Why.
New York, NY: Basic Books.
Enno Ruijters & Mariëlle Stoelinga (2015):
Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools.
Computer science review 15,
pp. 29–62,
doi:10.1016/j.cosrev.2015.03.001.
Dario D Salvucci (2006):
Modeling driver behavior in a cognitive architecture.
Human factors 48(2),
pp. 362–380,
doi:10.1037/0096-1523.29.2.363.
Bruce Schneier (2004):
Secrets and lies - digital security in a networked world: with new information about post-9/11 security.
Wiley.
W.E. Vesely, F.F. Goldberg, N.H. Roberts & D.F. Haasl (1981):
Fault Tree Handbook.
Lars Weber, Martin Baumann, Andreas Lüdtke & Rike Steenken (2009):
Modellierung von Entscheidungen beim Einfädeln auf die Autobahn.
To appear: Fortschritts-Berichte VDI: Der Mensch im Mittelpunkt technischer Systeme 8.