標題: Titlebook: Computer Safety, Reliability, and Security; SAFECOMP 2019 Worksh Alexander Romanovsky,Elena Troubitsyna,Friedemann Conference proceedings [打印本頁] 作者: Curator 時間: 2025-3-21 16:21
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名
作者: Limited 時間: 2025-3-21 20:57
A Modelling Approach for System Life Cycles Assurances understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a v作者: irreducible 時間: 2025-3-22 04:05 作者: 搜尋 時間: 2025-3-22 08:07
Comparative Evaluation of Security Fuzzing Approachesential for exposing vulnerabilities and the expected effort required to do so. These preliminary considerations based on abstract reasoning and engineering judgement are subsequently confronted with experimental evaluations based on the application of three different fuzzing tools characterized by d作者: 高談闊論 時間: 2025-3-22 09:01
Assuring Compliance with Protection Profiles with ThreatGetrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.作者: 藕床生厭倦 時間: 2025-3-22 16:58 作者: 藕床生厭倦 時間: 2025-3-22 20:30
Combined Approach for Safety and Security) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combin作者: Needlework 時間: 2025-3-22 22:54
Towards Integrated Quantitative Security and Safety Risk Assessment used for combined risk management. This paper presents the existing gaps, based on an overview of available methods, which is followed by the proposal towards a solution to achieve coordinated risk management by applying a quantitative security risk assessment methodology. This methodology extends 作者: Pageant 時間: 2025-3-23 02:44
Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applicationsthods from dependability engineering could be used to identify potential risk relating to safety and security of such applications. The demonstration object of this paper is a sensor network for air quality analysis and dynamic traffic control based on these data.作者: Ige326 時間: 2025-3-23 07:49
Increasing Safety of Neural Networks in Medical Devicesetworks are used to detect certain medical/decease indications. For example, a potential imminent asthma insult is detected based e.g. on breathing pattern, heart rate, and a few optional additional parameters. The patient receives a warning message and can either change his behavior and/or take som作者: 兇殘 時間: 2025-3-23 10:26
Smart Wristband for Votingications. The technical advancement of cyber-physical systems (CPS) paved the way for an easy and fast development of Internet of Things (IoT) devices. In this work, a voting wristband that uses hand gestures and the measurement of the corresponding barometric air pressure for voting has been develo作者: preeclampsia 時間: 2025-3-23 17:46
Automotive Cybersecurity Standards - Relation and Overviewe-, maintenance- and traffic safety features. This highly connected networking also increase the attractiveness of an attack on vehicles and the connected infrastructure by hackers with different motivations and thus introduces new risks for vehicle cybersecurity..Highly aware of this fact, the auto作者: Devastate 時間: 2025-3-23 18:34 作者: 結(jié)構(gòu) 時間: 2025-3-23 23:55 作者: 侵略者 時間: 2025-3-24 05:40
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Resultsensing and object detection, safe positioning, and broadband radio communication. To prove safety of the SISTER solution, CENELEC-compliant Verification and Validation (V&V) is obviously required. In the SISTER project, we tackled the challenge of defining and applying a compact V&V methodology, abl作者: 獎牌 時間: 2025-3-24 07:31
0302-9743 ..STRIVE 2019:. Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms..WAISE 2019:. Second International Workshop on Artificial Intelligence Safety Engineering..?.978-3-030-26249-5978-3-030-26250-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: ITCH 時間: 2025-3-24 13:20
https://doi.org/10.1007/978-94-009-8668-8tracts. The proposed safety-case architecture is analyzed against possible product-line changes and it is shown that it is robust both with respect to fine and coarse-grained, and also product and implementation-level changes. The proposed modular safety case is exemplified on a simplified, but real作者: LATER 時間: 2025-3-24 15:40
Seth Michelson,Timothy Schofield security engineering are not widely used at the moment, or practitioners are not aware of this feature. For privacy engineering, the availability and usage of standards, analysis methodologies and software tools are relatively weaker than for safety and security, reflecting the fact that privacy en作者: beta-carotene 時間: 2025-3-24 21:53 作者: Incommensurate 時間: 2025-3-25 02:07
Judicial Reform and Human Rightshed and published a committee draft of the “ISO-SAE Approved new Work Item (AWI) 21434 Road Vehicles - Cybersecurity Engineering” standard. In addition to that SAE is also working on a set of cybersecurity guidance, ISO is addressing specific automotive cybersecurity related topics in additional sta作者: dandruff 時間: 2025-3-25 05:14
Modular Safety Cases for Product Lines Based on Assume-Guarantee Contractstracts. The proposed safety-case architecture is analyzed against possible product-line changes and it is shown that it is robust both with respect to fine and coarse-grained, and also product and implementation-level changes. The proposed modular safety case is exemplified on a simplified, but real作者: 掃興 時間: 2025-3-25 10:26
A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Sys security engineering are not widely used at the moment, or practitioners are not aware of this feature. For privacy engineering, the availability and usage of standards, analysis methodologies and software tools are relatively weaker than for safety and security, reflecting the fact that privacy en作者: 割讓 時間: 2025-3-25 11:59
Increasing Safety of Neural Networks in Medical Devicese used in order to both increase safety and reliability of a neural network in a medical device. We use a combination of online and offline tests to detect undesired behavior. Online tests are performed in regular intervals during therapy and offline tests are performed when the device is not perfor作者: 紡織品 時間: 2025-3-25 19:09
Automotive Cybersecurity Standards - Relation and Overviewhed and published a committee draft of the “ISO-SAE Approved new Work Item (AWI) 21434 Road Vehicles - Cybersecurity Engineering” standard. In addition to that SAE is also working on a set of cybersecurity guidance, ISO is addressing specific automotive cybersecurity related topics in additional sta作者: Adjourn 時間: 2025-3-25 21:59 作者: 花束 時間: 2025-3-26 00:38
Primary Production in the Indian Ocean Ins of safety-critical systems development. We investigate how STAMP and STPA can be related to use of assurance cases. This is done in a generic way by representing the STPA steps as part of the evidence and claim documentations within GSN.作者: 美食家 時間: 2025-3-26 07:39 作者: urethritis 時間: 2025-3-26 09:33 作者: 朝圣者 時間: 2025-3-26 12:41 作者: Affable 時間: 2025-3-26 19:45 作者: Slit-Lamp 時間: 2025-3-26 23:58
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Resultsf the methodology is to produce V&V results that can be reused for future industrial exploitation of SISTER outcomes after project termination. This paper presents the V&V methodology that is currently applied in parallel to the progress of project activities, with preliminary results from its application.作者: 減去 時間: 2025-3-27 03:42
Towards Integrated Quantitative Security and Safety Risk Assessmentestablished safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.作者: 損壞 時間: 2025-3-27 06:16 作者: synchronous 時間: 2025-3-27 11:13
Blue Light-Induced Intracellular Movementshat it is not just the technical assurance that is challenging. It is the entirety of the socio-technical system that supports assurance. In this paper, the second part of the Safety-Security Assurance Framework - the Socio-Technical Model (SSAF STM) is presented as one way of reasoning about these wider issues that make co-assurance difficult.作者: 砍伐 時間: 2025-3-27 14:07
Structured Reasoning for Socio-Technical Factors of Safety-Security Assurancehat it is not just the technical assurance that is challenging. It is the entirety of the socio-technical system that supports assurance. In this paper, the second part of the Safety-Security Assurance Framework - the Socio-Technical Model (SSAF STM) is presented as one way of reasoning about these wider issues that make co-assurance difficult.作者: condescend 時間: 2025-3-27 19:35
https://doi.org/10.1007/0-306-46853-0established safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.作者: 強壯 時間: 2025-3-28 00:14 作者: JAMB 時間: 2025-3-28 02:50
Primary Production in the Indian Ocean IIsurance as data included in?tokens. The intended application is a formulation of the DEOS life cycle model with assurance that it achieves open systems dependability, which is standardised as IEC?62853.作者: MEAN 時間: 2025-3-28 08:47 作者: 典型 時間: 2025-3-28 12:08 作者: Fretful 時間: 2025-3-28 16:46
https://doi.org/10.1007/978-3-319-76672-0nce mechanism where, the system continuously monitors itself and activates corrective measures in the event of safety-critical failures, thereby aiding the system to sustain a safe behavior at runtime. We illustrate the presented approach by employing an example from autonomous agricultural domain and discuss the case study with initial findings.作者: 溫和女人 時間: 2025-3-28 20:32 作者: hereditary 時間: 2025-3-29 01:07 作者: bizarre 時間: 2025-3-29 05:29 作者: 松雞 時間: 2025-3-29 08:42 作者: 作嘔 時間: 2025-3-29 13:28 作者: Recessive 時間: 2025-3-29 16:45
Primary Production in the Indian Ocean Ision-critical and safety-critical systems. Goal Structuring Notation (GSN) is the most employed graphical notation for documenting dependability cases. System Theoretic Process Analysis (STPA) is a technique, based on System Theoretic Accidents Model and Process (STAMP), to identify hazardous contro作者: Ptsd429 時間: 2025-3-29 23:02
Primary Production in the Indian Ocean IIs understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a v作者: restrain 時間: 2025-3-30 02:48 作者: 救護車 時間: 2025-3-30 06:00 作者: Iniquitous 時間: 2025-3-30 10:11
Seth Michelson,Timothy Schofieldrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.作者: graphy 時間: 2025-3-30 13:27
Seth Michelson,Timothy Schofieldeed to also comply with security and privacy standards. This paper aims to provide insights into how practitioners apply the standards on safety, security or privacy (Sa/Se/Pr), as well as how they employ Sa/Se/Pr analysis methodologies and software tools to meet such criteria. To this end, we condu作者: Omnipotent 時間: 2025-3-30 18:03
Design of A Statistical Experiment,) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combin