派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; 25th International C Janusz Górski Conference proceedings 2006 Springer-Verlag Berlin Heidelber [打印本頁]

作者: HEIR    時間: 2025-3-21 19:58
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度學科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名





作者: incredulity    時間: 2025-3-21 22:51

作者: incarcerate    時間: 2025-3-22 03:41

作者: Platelet    時間: 2025-3-22 05:24

作者: 不容置疑    時間: 2025-3-22 10:33

作者: 老人病學    時間: 2025-3-22 13:38
Computer System Survivability Modelling by Using Stochastic Activity Network branch of Stochastic Petri Nets and has a well-developed software tool, M?bius. A known model of incident process and the computer system is adapted and extended. The computer system characterised by the working state and defence mechanism strength is affected by an attack described by using stocha
作者: 老人病學    時間: 2025-3-22 18:22

作者: ornithology    時間: 2025-3-22 22:47
Regulatory Software Configuration Management System Designontrol and Information System (DCIS) of a nuclear power plant. The main reason is that the DCIS of a nuclear plant are usually constructed by multiple vendors and each vendor of the DCIS has its own development environment, such as its development platform, software language and source code. The dif
作者: Rustproof    時間: 2025-3-23 04:35
Gaining Confidence in the Software Development Process Using Expert Systemsuilding amongst software safety experts. Thus the reasoning underpinning compliance to these standards tends to be quite subjective. In addition, there are factors such as the size of the project, the effect of a review process on earlier phases of the development lifecycle, the complexity of the de
作者: Ingrained    時間: 2025-3-23 07:34
Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems approach to formal system model evolution can be developed into a versatile structured approach for the mechanical construction of fault trees. The system structure and the structure of retrenchment concessions interact to generate fault trees with appropriately deep nesting. The same interactions
作者: Heart-Rate    時間: 2025-3-23 10:59

作者: ornithology    時間: 2025-3-23 14:17
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfigurationor systems with online-reconfiguration in a cost-efficient manner. Therefore, the required hazard analysis has to consider not only a concrete system and its embedded software but also the different software configurations. We present several extensions to an existing component-based hazard analysis
作者: Insubordinate    時間: 2025-3-23 19:47
New VoIP Traffic Security Scheme with Digital Watermarkingprotocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is bas
作者: animated    時間: 2025-3-24 00:47

作者: Graduated    時間: 2025-3-24 02:56
Using Group Overlapping to Protect Server from Attack in Grid Computingre relayed through the adjacent nodes and do not contain identity information about the sender. Since these packets are passed through a dynamically-formed path and since the final destination is not known until the last time, it is impossible to know who has sent it in the beginning and who will be
作者: 表皮    時間: 2025-3-24 07:34

作者: conjunctivitis    時間: 2025-3-24 13:48

作者: 遍及    時間: 2025-3-24 16:10

作者: 骨    時間: 2025-3-24 20:20

作者: 贊美者    時間: 2025-3-24 23:23
The Boundary Element Method with Programmingducts. This paper proposes an Agent-based Software Configuration Management (ABSCM) System based on the CM process area of CMMI as well as nuclear safety-related regulations to support the operation of nuclear power plant.
作者: 上漲    時間: 2025-3-25 07:19

作者: 左右連貫    時間: 2025-3-25 08:22

作者: 焦慮    時間: 2025-3-25 13:26

作者: 全部逛商店    時間: 2025-3-25 16:46

作者: 慟哭    時間: 2025-3-25 19:58
Gaining Confidence in the Software Development Process Using Expert Systems some arguments that can be supported using the proposed system..This paper and the work it describes were partly funded by the Health and Safety Executive. The opinions or conclusions expressed are those of the authors alone and do not necessarily represent the views of the Health and Safety Execut
作者: inhibit    時間: 2025-3-26 03:44

作者: Adenocarcinoma    時間: 2025-3-26 07:42
0302-9743 elected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America.978-3-540-45762-6978-3-540-45763-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 我就不公正    時間: 2025-3-26 10:03

作者: resistant    時間: 2025-3-26 14:21
Boundary-Scan Basics and Vocabulary,e cases feasible. The techniques we describe readily generalise to encompass timing, allowing glitches and other transient errors to be properly described. Lastly, a mild generalisation to cope with cyclic system descriptions allows the timed theory to encompass systems with feedback.
作者: Spinous-Process    時間: 2025-3-26 18:46
IEEE 1149.4 Analog Boundary-Scan,tifies the variant or combination of variants with the worst hazard probability. Finally, we show that also the hazards of systems with online-reconfiguration can be analyzed using the presented approach.
作者: 占線    時間: 2025-3-27 00:44
https://doi.org/10.1007/b117549 very likely to degrade the network security policy. The discovering and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a set of mechanisms for such a management.
作者: 嚙齒動物    時間: 2025-3-27 04:21

作者: 生氣地    時間: 2025-3-27 06:42

作者: anesthesia    時間: 2025-3-27 10:36

作者: 要控制    時間: 2025-3-27 15:44

作者: defendant    時間: 2025-3-27 19:12
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfigurationtifies the variant or combination of variants with the worst hazard probability. Finally, we show that also the hazards of systems with online-reconfiguration can be analyzed using the presented approach.
作者: Junction    時間: 2025-3-27 23:23
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies very likely to degrade the network security policy. The discovering and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a set of mechanisms for such a management.
作者: 笨拙處理    時間: 2025-3-28 04:24
Using Group Overlapping to Protect Server from Attack in Grid Computingom node along the path between the client and the server node is selected as an agent node and works as a proxy: the client will see it as the server and the server looks at it as the client, hence protecting the identity of the client and the server from anonymity-breaking attacks.
作者: Conspiracy    時間: 2025-3-28 06:32
Assessment of Hazard Identification Methods for the Automotive Domainith statistical significance, that the adapted FFA method is less time consuming and easier to use than the ESA method. Hence, the FFA method is found to be more suitable for hazard identification in early phases of development in this context.
作者: geriatrician    時間: 2025-3-28 10:55
New VoIP Traffic Security Scheme with Digital Watermarkinged on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.
作者: 武器    時間: 2025-3-28 18:00
The Role of Situation Awareness in Assuring Safety of Autonomous Vehiclesope with the problem of environment dynamics and incomplete and uncertain situation knowledge. The approach is presented for a simple example of a simulated autonomous vehicle. The situation awareness model and autonomous vehicle control system architecture is presented. The problems of justifying system safety are discussed.
作者: 現(xiàn)存    時間: 2025-3-28 22:13
Demonstration of Safety in Healthcare Organisations The NHS is undergoing major changes in accordance with its 10-year modernisation plan. These changes cannot be confined to the Trust level, but will have NHS-wide implications. The paper explores the possibility of an organisational safety case, which could be a useful tool in the management of such fundamental changes.
作者: 冒號    時間: 2025-3-29 01:10
IEEE 1149.4 Analog Boundary-Scan,ed on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.
作者: collagen    時間: 2025-3-29 07:07
IEEE 1149.4 Analog Boundary-Scan,ope with the problem of environment dynamics and incomplete and uncertain situation knowledge. The approach is presented for a simple example of a simulated autonomous vehicle. The situation awareness model and autonomous vehicle control system architecture is presented. The problems of justifying system safety are discussed.
作者: 干涉    時間: 2025-3-29 07:28

作者: AGONY    時間: 2025-3-29 15:28
Dealing with corners and changing geometry,hese systems. This paper explores the use of machine learning techniques to extract potential causal relationships from simulation models. This is illustrated with a case study of a military system of systems.
作者: visual-cortex    時間: 2025-3-29 19:02
The Boundary Element Method with Programmingtre of gravity of node degree distribution and other. To the best of our knowledge, these measures are proposed for the first time. Our results confirm that the migration process steps relatively fast.
作者: BLAZE    時間: 2025-3-29 22:44
Dealing with corners and changing geometry,onment). The heuristic based proof automation techniques realized in VSE result in an average grade of automation of 80 percent. Thus, VSE provides substantial support for the specification and verification of cryptographic protocols.
作者: 積習已深    時間: 2025-3-30 03:49

作者: 箴言    時間: 2025-3-30 05:25
https://doi.org/10.1007/978-3-211-71576-5tion Systems is presented. The model-based computer system quantitative characteristics are analysed and survivability is chosen to evaluate the modelled computer system security. The article concludes with simulation results and future work guidelines.
作者: 笨重    時間: 2025-3-30 08:25

作者: aesthetician    時間: 2025-3-30 15:37

作者: Tidious    時間: 2025-3-30 18:38
System of Systems Hazard Analysis Using Simulation and Machine Learninghese systems. This paper explores the use of machine learning techniques to extract potential causal relationships from simulation models. This is illustrated with a case study of a military system of systems.
作者: opprobrious    時間: 2025-3-31 00:20
On Certain Behavior of Scale-Free Networks Under Malicious Attackstre of gravity of node degree distribution and other. To the best of our knowledge, these measures are proposed for the first time. Our results confirm that the migration process steps relatively fast.
作者: 調(diào)色板    時間: 2025-3-31 04:42

作者: mosque    時間: 2025-3-31 08:51
Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industryr resource allocation to production and to security/safety. The simulation model allows studying the resilience of the system depending on management policies and incidents as represented in the risk matrix. We show that there is a region where the system behaviour is very sensitive to changes in resource allocation and to incidents.
作者: 頌揚國家    時間: 2025-3-31 11:26

作者: bonnet    時間: 2025-3-31 15:51
Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear o the software development, testing, and safety analysis processes of international standards. The safety assessment of the software for the KNICS Reactor Protection System and Programmable Logic Controller is a joint Korean/German project. The assessment methods applied in the project and the experiences gained from this project are presented.
作者: analogous    時間: 2025-3-31 21:15

作者: Expand    時間: 2025-4-1 01:05
Conference proceedings 2006hed in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art
作者: critique    時間: 2025-4-1 02:42

作者: 細胞    時間: 2025-4-1 06:54
https://doi.org/10.1007/11875567Unified Modeling Language (UML); computer reliability; computer safety; computer security; correct syste
作者: interrupt    時間: 2025-4-1 10:41
978-3-540-45762-6Springer-Verlag Berlin Heidelberg 2006
作者: parsimony    時間: 2025-4-1 17:46
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233732.jpg
作者: conformity    時間: 2025-4-1 19:42

作者: cipher    時間: 2025-4-2 02:13
Gernot Beer,Ian M. Smith,Christian Duensere representation of the attack patterns. Several are the models proposed to represent them; these models usually provide a generic representation of attacks. Conversely, the experience shows that attack profiles are strongly dependent upon several “boundary conditions”. This paper defends that from
作者: 諄諄教誨    時間: 2025-4-2 04:26





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
乌苏市| 清水河县| 南和县| 临城县| 涟源市| 石景山区| 石门县| 宾阳县| 威信县| 馆陶县| 会宁县| 深州市| 秦安县| 孟津县| 长子县| 修水县| 郧西县| 寿阳县| 罗山县| 灯塔市| 云浮市| 五大连池市| 和静县| 宜丰县| 新宾| 万安县| 阿克苏市| 乌拉特后旗| 德钦县| 二连浩特市| 随州市| 安阳市| 庆元县| 五莲县| 罗甸县| 会理县| 白玉县| 商城县| 竹溪县| 凉城县| 凤庆县|