Scholarship & Graduate School Application [2023] Dr. Shyam Karrah [slides]
Software Safety: Process Overview and Application [2023] Dr. Mike Siok [slides] [video]
Software Project Planning and Management & Ethics and Professional Responsibility for CS & SE [2023] Dr. Klyne Smith [slides I] [slides II] [video I] [video II]
Use cases for Blockchain Technology [2022] Dr. Liang Seng Koh and Dr. Sean Pan RFCyber Corp [slides] [video]
Blockchain, Smart Contract, and Corporate America [2022] Professor Sophia Hu
Baylor University [slides] [video]
Blockchain and Smart Contracts - Testing and Repair [2022] Mr. Dongcheng Li and Professor W. Eric Wong The University of Texas at Dallas [slides] [video]
Chapter 15: Software Hazard and Requirements Analysis
Chapter 16: Designing for Safety
IEEE Software Magazine on Safety-Critical Software
Be More Familiar with Our Enemies and Pave the Way Forward:
A Review of the Roles Bugs Played in Software Failures,
W. Eric Wong, Xuelin Li, and Philip A. Laplante,
Journal of Systems and Software, Volume 133, pp. 68-94, November 2017
Basic Concepts and Taxonomy of Dependable and Secure Computing
A. Avizienis, J.C. Laprie, B. Randell, and C. Landwehr,
IEEE Transactions on Dependable and Secure Computing,
Volume 1, Issue 1, pp. 11-33, January 2004
What Is Undergraduate Research and Why Does It Matter?
Fault Tree Handbook U.S. Nuclear Regulatory Commission
[download]
[local]
Additional Reading Materials
Requirements Development, Verification, and Validation Exhibited in Famous Failures
Terry Bahill and Steven Henderson
[download]