[1]Avizienis A,Laprie J C,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing:IEEE Transactions on Dependable and Secure Computing,2004.
[2]Sommerville I.Software engineering.Pearson,2015.
[3]SOFTWARE 2015:A national software strategy to ensure U.S.security and competitiveness report of the 2nd national software summit,April 29,2005.
[4]Butler M,Leuschel M,Presti S,et al.The use of formal methods in the analysis of trust.Lecture Notes in Computer Science,2004,2995:333-339.
[5]Mulligany D K,Schneider F B.Doctrine for cybersecurity.Technical Report,Cornell University,2011(5).
[6]Hoos H.Programming by optimization.Communications of the ACM,2012(2),55(2).
[7]Lee E A,Parks T M.Dataflow process networks.Proceedings of the IEEE,1995(5),83(5):773-801.
[8]Kang E,Jackson E,Schulte W.An approach for effective design space exploration,foundations of computer software:modeling,development,and verification of adaptive systems.Monterey Workshop,Lecture Notes in Computer Science,Springer,2010.
[9]Common Criteria for Information Technology Security Evaluation,Revision 5 in 2017.
[10]Kopetz H,Obermaisser R,Salloum C E,et al.Automotive software development for a multi-core system-on-a-chip:Fourth International Workshop on Software Engineering for Automotive Systems,2007.
[11]Wang G Q,Zhao W H.The principles of integrated technology in avionics systems.Academic Press,2020.
[12]Staron M.AUTOSAR (AUTomotive Open System ARchitecture).Automotive Software Architectures.Springer,2021.
[13]Efroni S,Harel D,Cohen I R.Reactive animation:realistic modeling of complex dynamic systems.Computer,2005(1).
[14]Bliudze S,Furic S,Sifakis J,et al.Rigorous design of cyber-physical systems—linking physicality and computation.Software&Systems Modeling,2017(12).
[15]Sifakis J.Autonomous systems—an architectural characterization.arXiv,2018(11).