標題: Titlebook: Computer Safety, Reliability, and Security; 25th International C Janusz Górski Conference proceedings 2006 Springer-Verlag Berlin Heidelber [打印本頁] 作者: HEIR 時間: 2025-3-21 19:58
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度學科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名
作者: incredulity 時間: 2025-3-21 22:51 作者: incarcerate 時間: 2025-3-22 03:41 作者: Platelet 時間: 2025-3-22 05:24 作者: 不容置疑 時間: 2025-3-22 10:33 作者: 老人病學 時間: 2025-3-22 13:38
Computer System Survivability Modelling by Using Stochastic Activity Network branch of Stochastic Petri Nets and has a well-developed software tool, M?bius. A known model of incident process and the computer system is adapted and extended. The computer system characterised by the working state and defence mechanism strength is affected by an attack described by using stocha作者: 老人病學 時間: 2025-3-22 18:22 作者: ornithology 時間: 2025-3-22 22:47
Regulatory Software Configuration Management System Designontrol and Information System (DCIS) of a nuclear power plant. The main reason is that the DCIS of a nuclear plant are usually constructed by multiple vendors and each vendor of the DCIS has its own development environment, such as its development platform, software language and source code. The dif作者: Rustproof 時間: 2025-3-23 04:35
Gaining Confidence in the Software Development Process Using Expert Systemsuilding amongst software safety experts. Thus the reasoning underpinning compliance to these standards tends to be quite subjective. In addition, there are factors such as the size of the project, the effect of a review process on earlier phases of the development lifecycle, the complexity of the de作者: Ingrained 時間: 2025-3-23 07:34
Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems approach to formal system model evolution can be developed into a versatile structured approach for the mechanical construction of fault trees. The system structure and the structure of retrenchment concessions interact to generate fault trees with appropriately deep nesting. The same interactions 作者: Heart-Rate 時間: 2025-3-23 10:59 作者: ornithology 時間: 2025-3-23 14:17
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfigurationor systems with online-reconfiguration in a cost-efficient manner. Therefore, the required hazard analysis has to consider not only a concrete system and its embedded software but also the different software configurations. We present several extensions to an existing component-based hazard analysis作者: Insubordinate 時間: 2025-3-23 19:47
New VoIP Traffic Security Scheme with Digital Watermarkingprotocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is bas作者: animated 時間: 2025-3-24 00:47 作者: Graduated 時間: 2025-3-24 02:56
Using Group Overlapping to Protect Server from Attack in Grid Computingre relayed through the adjacent nodes and do not contain identity information about the sender. Since these packets are passed through a dynamically-formed path and since the final destination is not known until the last time, it is impossible to know who has sent it in the beginning and who will be作者: 表皮 時間: 2025-3-24 07:34 作者: conjunctivitis 時間: 2025-3-24 13:48 作者: 遍及 時間: 2025-3-24 16:10 作者: 骨 時間: 2025-3-24 20:20 作者: 贊美者 時間: 2025-3-24 23:23
The Boundary Element Method with Programmingducts. This paper proposes an Agent-based Software Configuration Management (ABSCM) System based on the CM process area of CMMI as well as nuclear safety-related regulations to support the operation of nuclear power plant.作者: 上漲 時間: 2025-3-25 07:19 作者: 左右連貫 時間: 2025-3-25 08:22 作者: 焦慮 時間: 2025-3-25 13:26 作者: 全部逛商店 時間: 2025-3-25 16:46 作者: 慟哭 時間: 2025-3-25 19:58
Gaining Confidence in the Software Development Process Using Expert Systems some arguments that can be supported using the proposed system..This paper and the work it describes were partly funded by the Health and Safety Executive. The opinions or conclusions expressed are those of the authors alone and do not necessarily represent the views of the Health and Safety Execut作者: inhibit 時間: 2025-3-26 03:44 作者: Adenocarcinoma 時間: 2025-3-26 07:42
0302-9743 elected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America.978-3-540-45762-6978-3-540-45763-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 我就不公正 時間: 2025-3-26 10:03 作者: resistant 時間: 2025-3-26 14:21
Boundary-Scan Basics and Vocabulary,e cases feasible. The techniques we describe readily generalise to encompass timing, allowing glitches and other transient errors to be properly described. Lastly, a mild generalisation to cope with cyclic system descriptions allows the timed theory to encompass systems with feedback.作者: Spinous-Process 時間: 2025-3-26 18:46
IEEE 1149.4 Analog Boundary-Scan,tifies the variant or combination of variants with the worst hazard probability. Finally, we show that also the hazards of systems with online-reconfiguration can be analyzed using the presented approach.作者: 占線 時間: 2025-3-27 00:44
https://doi.org/10.1007/b117549 very likely to degrade the network security policy. The discovering and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a set of mechanisms for such a management.作者: 嚙齒動物 時間: 2025-3-27 04:21 作者: 生氣地 時間: 2025-3-27 06:42 作者: anesthesia 時間: 2025-3-27 10:36 作者: 要控制 時間: 2025-3-27 15:44 作者: defendant 時間: 2025-3-27 19:12
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfigurationtifies the variant or combination of variants with the worst hazard probability. Finally, we show that also the hazards of systems with online-reconfiguration can be analyzed using the presented approach.作者: Junction 時間: 2025-3-27 23:23
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies very likely to degrade the network security policy. The discovering and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a set of mechanisms for such a management.作者: 笨拙處理 時間: 2025-3-28 04:24
Using Group Overlapping to Protect Server from Attack in Grid Computingom node along the path between the client and the server node is selected as an agent node and works as a proxy: the client will see it as the server and the server looks at it as the client, hence protecting the identity of the client and the server from anonymity-breaking attacks.作者: Conspiracy 時間: 2025-3-28 06:32
Assessment of Hazard Identification Methods for the Automotive Domainith statistical significance, that the adapted FFA method is less time consuming and easier to use than the ESA method. Hence, the FFA method is found to be more suitable for hazard identification in early phases of development in this context.作者: geriatrician 時間: 2025-3-28 10:55
New VoIP Traffic Security Scheme with Digital Watermarkinged on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.作者: 武器 時間: 2025-3-28 18:00
The Role of Situation Awareness in Assuring Safety of Autonomous Vehiclesope with the problem of environment dynamics and incomplete and uncertain situation knowledge. The approach is presented for a simple example of a simulated autonomous vehicle. The situation awareness model and autonomous vehicle control system architecture is presented. The problems of justifying system safety are discussed.作者: 現(xiàn)存 時間: 2025-3-28 22:13
Demonstration of Safety in Healthcare Organisations The NHS is undergoing major changes in accordance with its 10-year modernisation plan. These changes cannot be confined to the Trust level, but will have NHS-wide implications. The paper explores the possibility of an organisational safety case, which could be a useful tool in the management of such fundamental changes.作者: 冒號 時間: 2025-3-29 01:10
IEEE 1149.4 Analog Boundary-Scan,ed on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.作者: collagen 時間: 2025-3-29 07:07
IEEE 1149.4 Analog Boundary-Scan,ope with the problem of environment dynamics and incomplete and uncertain situation knowledge. The approach is presented for a simple example of a simulated autonomous vehicle. The situation awareness model and autonomous vehicle control system architecture is presented. The problems of justifying system safety are discussed.作者: 干涉 時間: 2025-3-29 07:28 作者: AGONY 時間: 2025-3-29 15:28
Dealing with corners and changing geometry,hese systems. This paper explores the use of machine learning techniques to extract potential causal relationships from simulation models. This is illustrated with a case study of a military system of systems.作者: visual-cortex 時間: 2025-3-29 19:02
The Boundary Element Method with Programmingtre of gravity of node degree distribution and other. To the best of our knowledge, these measures are proposed for the first time. Our results confirm that the migration process steps relatively fast.作者: BLAZE 時間: 2025-3-29 22:44
Dealing with corners and changing geometry,onment). The heuristic based proof automation techniques realized in VSE result in an average grade of automation of 80 percent. Thus, VSE provides substantial support for the specification and verification of cryptographic protocols.作者: 積習已深 時間: 2025-3-30 03:49 作者: 箴言 時間: 2025-3-30 05:25
https://doi.org/10.1007/978-3-211-71576-5tion Systems is presented. The model-based computer system quantitative characteristics are analysed and survivability is chosen to evaluate the modelled computer system security. The article concludes with simulation results and future work guidelines.作者: 笨重 時間: 2025-3-30 08:25 作者: aesthetician 時間: 2025-3-30 15:37 作者: Tidious 時間: 2025-3-30 18:38
System of Systems Hazard Analysis Using Simulation and Machine Learninghese systems. This paper explores the use of machine learning techniques to extract potential causal relationships from simulation models. This is illustrated with a case study of a military system of systems.作者: opprobrious 時間: 2025-3-31 00:20
On Certain Behavior of Scale-Free Networks Under Malicious Attackstre of gravity of node degree distribution and other. To the best of our knowledge, these measures are proposed for the first time. Our results confirm that the migration process steps relatively fast.作者: 調(diào)色板 時間: 2025-3-31 04:42 作者: mosque 時間: 2025-3-31 08:51
Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industryr resource allocation to production and to security/safety. The simulation model allows studying the resilience of the system depending on management policies and incidents as represented in the risk matrix. We show that there is a region where the system behaviour is very sensitive to changes in resource allocation and to incidents.作者: 頌揚國家 時間: 2025-3-31 11:26 作者: bonnet 時間: 2025-3-31 15:51
Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear o the software development, testing, and safety analysis processes of international standards. The safety assessment of the software for the KNICS Reactor Protection System and Programmable Logic Controller is a joint Korean/German project. The assessment methods applied in the project and the experiences gained from this project are presented.作者: analogous 時間: 2025-3-31 21:15 作者: Expand 時間: 2025-4-1 01:05
Conference proceedings 2006hed in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art作者: critique 時間: 2025-4-1 02:42 作者: 細胞 時間: 2025-4-1 06:54
https://doi.org/10.1007/11875567Unified Modeling Language (UML); computer reliability; computer safety; computer security; correct syste作者: interrupt 時間: 2025-4-1 10:41
978-3-540-45762-6Springer-Verlag Berlin Heidelberg 2006作者: parsimony 時間: 2025-4-1 17:46
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233732.jpg作者: conformity 時間: 2025-4-1 19:42 作者: cipher 時間: 2025-4-2 02:13
Gernot Beer,Ian M. Smith,Christian Duensere representation of the attack patterns. Several are the models proposed to represent them; these models usually provide a generic representation of attacks. Conversely, the experience shows that attack profiles are strongly dependent upon several “boundary conditions”. This paper defends that from 作者: 諄諄教誨 時間: 2025-4-2 04:26