派博傳思國際中心

標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 30th International C Francesco Flammini,Sandro Bologna,Valeria Vittorin Conference proceedings [打印本頁]

作者: Abridge    時間: 2025-3-21 17:32
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名





作者: synovitis    時間: 2025-3-21 23:21
Hui Zhang,Yuxuan Tang,Tian Yi,Qiangming Yanhat preserves the architecture’s flexibility and helps to lower the integration costs. Our method is based on a language capable of specifying the conditions for a valid integration of a platform and of an application using a contract-based approach to model safety case interfaces. This paper presents the language in detail.
作者: 充氣女    時間: 2025-3-22 04:05

作者: 追逐    時間: 2025-3-22 07:01

作者: Bravura    時間: 2025-3-22 08:43

作者: 激勵    時間: 2025-3-22 13:18

作者: 激勵    時間: 2025-3-22 20:24

作者: 小說    時間: 2025-3-23 00:41
From Probabilistic Counterexamples via Causality to Fault Treeshe FT. We extend the structural equation approach by Pearl and Halpern, which is based on Lewis counterfactuals, so that it serves as a justification for the causality that our proposed FT derivation rules imply. We demonstrate the usefulness of our approach by applying it to an industrial case study.
作者: 生命    時間: 2025-3-23 04:32
Rigorous Evidence of Freedom from Concurrency Faults in Industrial Control Softwarehe main mechanisms involved in the tools and the main results and lessons learned from this work. An important conclusion of the paper is that the used verification techniques and tools scale efficiently and accurately to industrial control system software, which is a major requirement for real-life safety assessments.
作者: habile    時間: 2025-3-23 08:41

作者: GULF    時間: 2025-3-23 10:39

作者: Granular    時間: 2025-3-23 15:10
https://doi.org/10.1007/978-981-19-2133-9ques for requirements engineering and component-based engineering. Preliminary realisations and case studies confirm the interest and provide refined requirements for the final version of the platform.
作者: 管理員    時間: 2025-3-23 19:58

作者: 省略    時間: 2025-3-24 00:03

作者: 指派    時間: 2025-3-24 05:10

作者: 無意    時間: 2025-3-24 06:51

作者: 樸素    時間: 2025-3-24 12:02

作者: 織物    時間: 2025-3-24 18:00
,Save Canada’s Internet from WIPO,fy and reuse already existing verification measures in the development process for establishing confidence in the usage of software tools. Furthermore, the approach allows introducing new verification measures to optimize the overall development process.
作者: 縫紉    時間: 2025-3-24 23:02
Model-Driven Availability Evaluation of Railway Control Systemsnstruction. Starting from an extension to maintenance aspects of the MARTE-DAM profile for dependability analysis, an automated process based on model-to-model transformations is described. The process is applied to generate a Repairable Fault Trees model from the MARTE-DAM specification of the Radio Block Centre - a modern railway controller.
作者: 上下連貫    時間: 2025-3-25 00:53
Towards Cross-Domains Model-Based Safety Process, Methods and Tools for Critical Embedded Systems: Tques for requirements engineering and component-based engineering. Preliminary realisations and case studies confirm the interest and provide refined requirements for the final version of the platform.
作者: 連詞    時間: 2025-3-25 05:35

作者: COMMA    時間: 2025-3-25 09:35

作者: Magnitude    時間: 2025-3-25 14:05
Security Analysis of Smart Grid Data Collection Technologiesbeen conducted on a commercial synchrophasor produced by a major vendor, and on a widely used open source product for the Phasor Data Concentrator application. We describe the experimental setup, present the main results, and comment the findings of our research.
作者: LINES    時間: 2025-3-25 17:10

作者: engagement    時間: 2025-3-25 22:42
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam curring at the dam monitoring and control system, since they can result in issuing hazardous commands to control devices. We present examples of misuses and malicious activities and procedures to extend OSSIM for analyzing new event types.
作者: Mitigate    時間: 2025-3-26 03:19
Establishing Confidence in the Usage of Software Tools in Context of ISO 26262fy and reuse already existing verification measures in the development process for establishing confidence in the usage of software tools. Furthermore, the approach allows introducing new verification measures to optimize the overall development process.
作者: Host142    時間: 2025-3-26 05:30

作者: 任意    時間: 2025-3-26 10:26

作者: ALLEY    時間: 2025-3-26 13:40

作者: Insubordinate    時間: 2025-3-26 19:24
A Case Study on State-Based Robustness Testing of an Operating System for the Avionic Domaina Linux-based OS, to be adopted by Finmeccanica for safety-critical systems in the avionic domain. Results show that the OS state plays an important role in testing those corner cases not covered by traditional robustness testing.
作者: 容易懂得    時間: 2025-3-26 23:56
Conference proceedings 2011 in Naples, Italy, in September 2011.The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimi
作者: miracle    時間: 2025-3-27 04:35

作者: Inflated    時間: 2025-3-27 08:41
Products, Compilation, and Installation,he small subset of the Rules of the Air using the agent model checker AJPF. We introduce more advanced autonomy into the UAS agent and show that this too can be verified. Finally we compare and contrast the various approaches, discuss the paths towards full certification, and present directions for future research.
作者: Instantaneous    時間: 2025-3-27 11:08

作者: 手段    時間: 2025-3-27 14:24
Using a Software Safety Argument Pattern Catalogue: Two Case Studiesapplying the patterns, particularly in the case of users who are unfamiliar with the approach, and the authors recognise in response the need for better instructional material. But the results show that as part of the development of best practice in safety, the patterns promise signicant benets to i
作者: 狂熱語言    時間: 2025-3-27 18:53
Verifying Functional Behaviors of Automotive Products in EAST-ADL2 Using UPPAAL-PORTfined in order to specify the behavior model inside EAST-ADL2 and their interactions. A composition of the functional behaviors is considered a network of Timed Automata that enables us to verify behaviors of the entire system using the UPPAAL model checker. The method has been demonstrated by verif
作者: HACK    時間: 2025-3-27 22:30

作者: 你敢命令    時間: 2025-3-28 04:10
Introduction to Advanced Data Stores,applying the patterns, particularly in the case of users who are unfamiliar with the approach, and the authors recognise in response the need for better instructional material. But the results show that as part of the development of best practice in safety, the patterns promise signicant benets to i
作者: EVICT    時間: 2025-3-28 09:58
Introduction to Advanced Data Stores,fined in order to specify the behavior model inside EAST-ADL2 and their interactions. A composition of the functional behaviors is considered a network of Timed Automata that enables us to verify behaviors of the entire system using the UPPAAL model checker. The method has been demonstrated by verif
作者: 男學(xué)院    時間: 2025-3-28 11:33

作者: Functional    時間: 2025-3-28 17:43
Model-Driven Availability Evaluation of Railway Control Systemsaluate the impact of different maintenance policies considering cost/benefit factors. To that aim, maintenance models may be used within availability, performability or safety models, the latter developed using formal languages according to the requirements of international standards. In this paper,
作者: LAPSE    時間: 2025-3-28 21:56
Vertical Safety Interfaces – Improving the Efficiency of Modular Certificationety engineering. Particularly when applying integrated architectures like AUTOSAR or IMA, modular certification allows the construction of modular safety cases, which ensures the flexible handling of platforms and applications. However, the task of integrating these safety cases is still a manual an
作者: OPINE    時間: 2025-3-29 00:24

作者: 失誤    時間: 2025-3-29 03:38

作者: ANT    時間: 2025-3-29 07:54
From Probabilistic Counterexamples via Causality to Fault Treeswever, continues to be problematic since they have to be represented as sets of paths, and the number of paths in this set may be very large. Fault trees (FTs) are a well-established industrial technique to represent causalities for possible system hazards resulting from system or system component f
作者: 新奇    時間: 2025-3-29 12:35
Rigorous Evidence of Freedom from Concurrency Faults in Industrial Control Softwarenalyzes and safety assessments. In particular, the quality, correctness and dependability of control systems software need to be justified. This paper reports on the development of a tool-based methodology to address the demonstration of freedom from intrinsic software faults related to concurrency
作者: Triglyceride    時間: 2025-3-29 19:06
Evolutionary Risk Analysis: Expert Judgemente limited support in order to deal with changes and to assess their impacts on critical features (e.g. safety, security, etc.). This paper is concerned with how change requirements affect security properties. A change requirement is a specification of changes that are to be implemented in a system.
作者: 含鐵    時間: 2025-3-29 22:13
Computer-Aided PHA, FTA and FMEA for Automotive Embedded Systemsreasing complexity of automotive embedded systems. The safety-criticality of these systems demands the application of analysis techniques such as PHA (Preliminary Hazard Analysis), FTA (Fault Tree Analysis) and FMEA (Failure Modes and Effects Analysis) in the development process. The early applicati
作者: FLINT    時間: 2025-3-30 00:57
A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systeion strategies, and the ability to take decisions on the basis of current and past behavior of the system. In this paper we propose an anomalybased approach for the detection of online faults, which is able to (i) cope with highly variable and non-stationary environment and to (ii) work without any
作者: GOUGE    時間: 2025-3-30 04:25
Security Analysis of Smart Grid Data Collection Technologiesstructures are especially dangerous because they are tailored to disrupt assets which are essential to the functioning of the society as a whole. Examples of Critical Infrastructure sectors include transportation, communication, and utilities. Among these, power grids are possibly the most critical,
作者: DEMN    時間: 2025-3-30 09:16

作者: PRO    時間: 2025-3-30 13:07
An Integrated Approach for Availability and QoS Evaluation in Railway Systemsce quality levels offered to passengers. For this reason it is necessary to reach high availability standards, relying on high-dependable system components or identifying effective operational strategies addressed to mitigate failure effects. To this purpose, in this paper an innovative architecture
作者: Optimum    時間: 2025-3-30 17:41

作者: Hemiplegia    時間: 2025-3-30 21:44
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam cber attacks. To face such threat, organizations providing critical services are increasingly focusing on protecting their network infrastructures. Security Information and Event Management (SIEM) frameworks support network protection by performing centralized correlation of network asset reports. In
作者: Instinctive    時間: 2025-3-31 00:56

作者: brachial-plexus    時間: 2025-3-31 05:46

作者: MEAN    時間: 2025-3-31 12:17

作者: LARK    時間: 2025-3-31 16:10

作者: REP    時間: 2025-3-31 18:46
Francesco Flammini,Sandro Bologna,Valeria VittorinFast-track conference proceedings.State-of-the-art research.Up-to-date results
作者: Generosity    時間: 2025-3-31 23:07

作者: PALSY    時間: 2025-4-1 03:07

作者: micturition    時間: 2025-4-1 08:45





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
壤塘县| 彭阳县| 禹州市| 昌乐县| 乌鲁木齐市| 平定县| 天长市| 平陆县| 永顺县| 博湖县| 汉寿县| 独山县| 河东区| 马边| 谷城县| 吉木乃县| 海宁市| 深圳市| 桦甸市| 迁西县| 吉木乃县| 封丘县| 丰城市| 吉安县| 乌海市| 玉田县| 康定县| 崇仁县| 沛县| 桃园县| 客服| 西平县| 浮梁县| 明水县| 遵义县| 交口县| 竹山县| 永泰县| 曲麻莱县| 浙江省| 南靖县|