派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; SAFECOMP 2019 Worksh Alexander Romanovsky,Elena Troubitsyna,Friedemann Conference proceedings [打印本頁]

作者: Curator    時間: 2025-3-21 16:21
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名





作者: Limited    時間: 2025-3-21 20:57
A Modelling Approach for System Life Cycles Assurances understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a v
作者: irreducible    時間: 2025-3-22 04:05

作者: 搜尋    時間: 2025-3-22 08:07
Comparative Evaluation of Security Fuzzing Approachesential for exposing vulnerabilities and the expected effort required to do so. These preliminary considerations based on abstract reasoning and engineering judgement are subsequently confronted with experimental evaluations based on the application of three different fuzzing tools characterized by d
作者: 高談闊論    時間: 2025-3-22 09:01
Assuring Compliance with Protection Profiles with ThreatGetrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.
作者: 藕床生厭倦    時間: 2025-3-22 16:58

作者: 藕床生厭倦    時間: 2025-3-22 20:30
Combined Approach for Safety and Security) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combin
作者: Needlework    時間: 2025-3-22 22:54
Towards Integrated Quantitative Security and Safety Risk Assessment used for combined risk management. This paper presents the existing gaps, based on an overview of available methods, which is followed by the proposal towards a solution to achieve coordinated risk management by applying a quantitative security risk assessment methodology. This methodology extends
作者: Pageant    時間: 2025-3-23 02:44
Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applicationsthods from dependability engineering could be used to identify potential risk relating to safety and security of such applications. The demonstration object of this paper is a sensor network for air quality analysis and dynamic traffic control based on these data.
作者: Ige326    時間: 2025-3-23 07:49
Increasing Safety of Neural Networks in Medical Devicesetworks are used to detect certain medical/decease indications. For example, a potential imminent asthma insult is detected based e.g. on breathing pattern, heart rate, and a few optional additional parameters. The patient receives a warning message and can either change his behavior and/or take som
作者: 兇殘    時間: 2025-3-23 10:26
Smart Wristband for Votingications. The technical advancement of cyber-physical systems (CPS) paved the way for an easy and fast development of Internet of Things (IoT) devices. In this work, a voting wristband that uses hand gestures and the measurement of the corresponding barometric air pressure for voting has been develo
作者: preeclampsia    時間: 2025-3-23 17:46
Automotive Cybersecurity Standards - Relation and Overviewe-, maintenance- and traffic safety features. This highly connected networking also increase the attractiveness of an attack on vehicles and the connected infrastructure by hackers with different motivations and thus introduces new risks for vehicle cybersecurity..Highly aware of this fact, the auto
作者: Devastate    時間: 2025-3-23 18:34

作者: 結(jié)構(gòu)    時間: 2025-3-23 23:55

作者: 侵略者    時間: 2025-3-24 05:40
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Resultsensing and object detection, safe positioning, and broadband radio communication. To prove safety of the SISTER solution, CENELEC-compliant Verification and Validation (V&V) is obviously required. In the SISTER project, we tackled the challenge of defining and applying a compact V&V methodology, abl
作者: 獎牌    時間: 2025-3-24 07:31
0302-9743 ..STRIVE 2019:. Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms..WAISE 2019:. Second International Workshop on Artificial Intelligence Safety Engineering..?.978-3-030-26249-5978-3-030-26250-1Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: ITCH    時間: 2025-3-24 13:20
https://doi.org/10.1007/978-94-009-8668-8tracts. The proposed safety-case architecture is analyzed against possible product-line changes and it is shown that it is robust both with respect to fine and coarse-grained, and also product and implementation-level changes. The proposed modular safety case is exemplified on a simplified, but real
作者: LATER    時間: 2025-3-24 15:40
Seth Michelson,Timothy Schofield security engineering are not widely used at the moment, or practitioners are not aware of this feature. For privacy engineering, the availability and usage of standards, analysis methodologies and software tools are relatively weaker than for safety and security, reflecting the fact that privacy en
作者: beta-carotene    時間: 2025-3-24 21:53

作者: Incommensurate    時間: 2025-3-25 02:07
Judicial Reform and Human Rightshed and published a committee draft of the “ISO-SAE Approved new Work Item (AWI) 21434 Road Vehicles - Cybersecurity Engineering” standard. In addition to that SAE is also working on a set of cybersecurity guidance, ISO is addressing specific automotive cybersecurity related topics in additional sta
作者: dandruff    時間: 2025-3-25 05:14
Modular Safety Cases for Product Lines Based on Assume-Guarantee Contractstracts. The proposed safety-case architecture is analyzed against possible product-line changes and it is shown that it is robust both with respect to fine and coarse-grained, and also product and implementation-level changes. The proposed modular safety case is exemplified on a simplified, but real
作者: 掃興    時間: 2025-3-25 10:26
A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Sys security engineering are not widely used at the moment, or practitioners are not aware of this feature. For privacy engineering, the availability and usage of standards, analysis methodologies and software tools are relatively weaker than for safety and security, reflecting the fact that privacy en
作者: 割讓    時間: 2025-3-25 11:59
Increasing Safety of Neural Networks in Medical Devicese used in order to both increase safety and reliability of a neural network in a medical device. We use a combination of online and offline tests to detect undesired behavior. Online tests are performed in regular intervals during therapy and offline tests are performed when the device is not perfor
作者: 紡織品    時間: 2025-3-25 19:09
Automotive Cybersecurity Standards - Relation and Overviewhed and published a committee draft of the “ISO-SAE Approved new Work Item (AWI) 21434 Road Vehicles - Cybersecurity Engineering” standard. In addition to that SAE is also working on a set of cybersecurity guidance, ISO is addressing specific automotive cybersecurity related topics in additional sta
作者: Adjourn    時間: 2025-3-25 21:59

作者: 花束    時間: 2025-3-26 00:38
Primary Production in the Indian Ocean Ins of safety-critical systems development. We investigate how STAMP and STPA can be related to use of assurance cases. This is done in a generic way by representing the STPA steps as part of the evidence and claim documentations within GSN.
作者: 美食家    時間: 2025-3-26 07:39

作者: urethritis    時間: 2025-3-26 09:33

作者: 朝圣者    時間: 2025-3-26 12:41

作者: Affable    時間: 2025-3-26 19:45

作者: Slit-Lamp    時間: 2025-3-26 23:58
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Resultsf the methodology is to produce V&V results that can be reused for future industrial exploitation of SISTER outcomes after project termination. This paper presents the V&V methodology that is currently applied in parallel to the progress of project activities, with preliminary results from its application.
作者: 減去    時間: 2025-3-27 03:42
Towards Integrated Quantitative Security and Safety Risk Assessmentestablished safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.
作者: 損壞    時間: 2025-3-27 06:16

作者: synchronous    時間: 2025-3-27 11:13
Blue Light-Induced Intracellular Movementshat it is not just the technical assurance that is challenging. It is the entirety of the socio-technical system that supports assurance. In this paper, the second part of the Safety-Security Assurance Framework - the Socio-Technical Model (SSAF STM) is presented as one way of reasoning about these wider issues that make co-assurance difficult.
作者: 砍伐    時間: 2025-3-27 14:07
Structured Reasoning for Socio-Technical Factors of Safety-Security Assurancehat it is not just the technical assurance that is challenging. It is the entirety of the socio-technical system that supports assurance. In this paper, the second part of the Safety-Security Assurance Framework - the Socio-Technical Model (SSAF STM) is presented as one way of reasoning about these wider issues that make co-assurance difficult.
作者: condescend    時間: 2025-3-27 19:35
https://doi.org/10.1007/0-306-46853-0established safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.
作者: 強壯    時間: 2025-3-28 00:14

作者: JAMB    時間: 2025-3-28 02:50
Primary Production in the Indian Ocean IIsurance as data included in?tokens. The intended application is a formulation of the DEOS life cycle model with assurance that it achieves open systems dependability, which is standardised as IEC?62853.
作者: MEAN    時間: 2025-3-28 08:47

作者: 典型    時間: 2025-3-28 12:08

作者: Fretful    時間: 2025-3-28 16:46
https://doi.org/10.1007/978-3-319-76672-0nce mechanism where, the system continuously monitors itself and activates corrective measures in the event of safety-critical failures, thereby aiding the system to sustain a safe behavior at runtime. We illustrate the presented approach by employing an example from autonomous agricultural domain and discuss the case study with initial findings.
作者: 溫和女人    時間: 2025-3-28 20:32

作者: hereditary    時間: 2025-3-29 01:07

作者: bizarre    時間: 2025-3-29 05:29

作者: 松雞    時間: 2025-3-29 08:42

作者: 作嘔    時間: 2025-3-29 13:28

作者: Recessive    時間: 2025-3-29 16:45
Primary Production in the Indian Ocean Ision-critical and safety-critical systems. Goal Structuring Notation (GSN) is the most employed graphical notation for documenting dependability cases. System Theoretic Process Analysis (STPA) is a technique, based on System Theoretic Accidents Model and Process (STAMP), to identify hazardous contro
作者: Ptsd429    時間: 2025-3-29 23:02
Primary Production in the Indian Ocean IIs understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a v
作者: restrain    時間: 2025-3-30 02:48

作者: 救護車    時間: 2025-3-30 06:00

作者: Iniquitous    時間: 2025-3-30 10:11
Seth Michelson,Timothy Schofieldrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.
作者: graphy    時間: 2025-3-30 13:27
Seth Michelson,Timothy Schofieldeed to also comply with security and privacy standards. This paper aims to provide insights into how practitioners apply the standards on safety, security or privacy (Sa/Se/Pr), as well as how they employ Sa/Se/Pr analysis methodologies and software tools to meet such criteria. To this end, we condu
作者: Omnipotent    時間: 2025-3-30 18:03
Design of A Statistical Experiment,) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combin




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
上犹县| 交口县| 曲阳县| 乌拉特后旗| 济南市| 平凉市| 固阳县| 巴彦淖尔市| 正镶白旗| 南投市| 陇川县| 津南区| 德阳市| 吉首市| 攀枝花市| 黄平县| 建瓯市| 宿州市| 庆城县| 颍上县| 镇康县| 文成县| 喀什市| 南溪县| 灵丘县| 江永县| 丰原市| 武定县| 牡丹江市| 延边| 宣恩县| 吴江市| 静海县| 竹山县| 依安县| 紫阳县| 卢氏县| 安塞县| 乌兰察布市| 江孜县| 海原县|