標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 38th International C Alexander Romanovsky,Elena Troubitsyna,Friedemann Conference proceedings [打印本頁] 作者: 揭發(fā) 時間: 2025-3-21 17:07
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: Tremor 時間: 2025-3-21 22:14
https://doi.org/10.1007/978-3-030-26601-1artificial intelligence; computer networks; computer vision; embedded systems; image processing; image se作者: ear-canal 時間: 2025-3-22 04:25
978-3-030-26600-4Springer Nature Switzerland AG 2019作者: 多嘴 時間: 2025-3-22 04:44 作者: INCH 時間: 2025-3-22 09:02 作者: 名詞 時間: 2025-3-22 13:46 作者: 名詞 時間: 2025-3-22 19:24 作者: Musculoskeletal 時間: 2025-3-23 00:33 作者: 摘要記錄 時間: 2025-3-23 03:42
Getting Started: Identifying Your Needsdomains of the parameters span a huge space of possible test cases, from which “good” ones have to be selected. Heuristic search, guided by fitness functions, has been proposed as a suitable technique in the past. However, the . has not been addressed yet. We provide templates to formulate fitness f作者: 反抗者 時間: 2025-3-23 06:55
Getting Started: Identifying Your Needshich form the basis of all development effort. However, using SysML models for safety analysis has been restricted by the lack of defined modelling standards for analytical techniques like Fault Tree Analysis (FTA). In lieu of such standards, the ENCASE project (See acknowledgements.) has formulated作者: 不合 時間: 2025-3-23 10:20 作者: Spangle 時間: 2025-3-23 17:50 作者: 按等級 時間: 2025-3-23 18:50 作者: 珍奇 時間: 2025-3-24 02:08
Getting Started: Identifying Your Needs have to be numerically evaluated for the precise system-level dependability analysis. Data errors occurred in RAM or CPU registers can propagate to critical outputs and cause a failure. The reliability properties can be evaluated at the assembly level, i.e. on the compiled instructions, by performi作者: –吃 時間: 2025-3-24 04:58
Getting Started: Identifying Your Needsdata including camera images. State-of-the-art methods for object recognition and image segmentation rely on complex data-driven models such as convolutional neural networks. Although no final answer exists yet on how to perform safety evaluation of systems containing such models, such evaluation sh作者: 濃縮 時間: 2025-3-24 07:49
Getting Started: Identifying Your Needst human performance. The adoption of such systems in the medical domain should not happen, however, unless sufficient assurance can be demonstrated. In this paper we consider the implicit assurance argument for state-of-the-art systems that uses machine-learnt models for clinical diagnosis, e.g. ret作者: CALL 時間: 2025-3-24 11:45
The Roadmap for a Better Futureons. However, BACSs are prone to disruptions caused by failures or active attacks. Given the role BACSs play in critical locations such as airports and hospitals, a comprehensive impact assessment methodology is required that estimates the effect of unavailable components in the system. In this pape作者: 盡管 時間: 2025-3-24 16:52
The Roadmap for a Better Futuret compromising the robustness and integrity of the system. Adaptive MILS extends MILS, a successful paradigm for rigorously developed and assured composable static systems, with reconfiguration mechanisms and a framework within which those mechanisms may be safely and securely employed for adaptatio作者: 防水 時間: 2025-3-24 19:30 作者: incredulity 時間: 2025-3-25 01:40
Forecast Horizon for Automated Safety Actions in Automated Driving Systemsng scenarios, and based on the running example values, the FH is estimated. We conclude our work with a summary of the estimated FH for each of the specific driving scenarios at different road conditions and the recommended road speed limits. Such a scientific way of deciding optimal bounds on the F作者: Ige326 時間: 2025-3-25 07:09 作者: 敲竹杠 時間: 2025-3-25 09:07
Increasing Trust in Data-Driven Model Validationn at the object, context, and sensor levels. To provide realistic augmentation and meta-data for existing image datasets, known context information and conditional probabilities are processed. First applications on the GTSRB dataset show promising results. The augmentation of datasets facilitates a 作者: Innocence 時間: 2025-3-25 12:02
BACRank: Ranking Building Automation and Control System Components by Business Continuity Impactapplicability of our approach on a real BACS deployed at a 5-story building hosting 375 employees on an international university campus. The experimental evaluation confirms that the proposed methodology successfully prioritizes the most relevant components of the system with respect to the business作者: 河潭 時間: 2025-3-25 18:49
Model-Based Run-Time Synthesis of Architectural Configurations for Adaptive MILS Systemss, monitoring properties and the related alarms. Supporting tools have been developed for the run-time synthesis of new architectural configurations that preserve safety and security properties formalized in terms of invariants and information flow.作者: Mammal 時間: 2025-3-25 21:01 作者: Protein 時間: 2025-3-26 01:16
Getting Started: Identifying Your Needsng scenarios, and based on the running example values, the FH is estimated. We conclude our work with a summary of the estimated FH for each of the specific driving scenarios at different road conditions and the recommended road speed limits. Such a scientific way of deciding optimal bounds on the F作者: Seminar 時間: 2025-3-26 06:39
Getting Started: Identifying Your Needsulink models and even to design reliable control systems at the model level..In this paper, we propose a method for the reliability evaluation of Simulink models at the model level, extended with the assembly-level evaluation. More specifically, we transform the Simulink model into a stochastic dual作者: Overstate 時間: 2025-3-26 12:29
Getting Started: Identifying Your Needsn at the object, context, and sensor levels. To provide realistic augmentation and meta-data for existing image datasets, known context information and conditional probabilities are processed. First applications on the GTSRB dataset show promising results. The augmentation of datasets facilitates a 作者: Disk199 時間: 2025-3-26 15:46
The Roadmap for a Better Futureapplicability of our approach on a real BACS deployed at a 5-story building hosting 375 employees on an international university campus. The experimental evaluation confirms that the proposed methodology successfully prioritizes the most relevant components of the system with respect to the business作者: brachial-plexus 時間: 2025-3-26 19:57
The Roadmap for a Better Futures, monitoring properties and the related alarms. Supporting tools have been developed for the run-time synthesis of new architectural configurations that preserve safety and security properties formalized in terms of invariants and information flow.作者: G-spot 時間: 2025-3-26 23:22
Alexander Romanovsky,Elena Troubitsyna,Friedemann 作者: Perceive 時間: 2025-3-27 05:08
Towards Zero Alarms in Sound Static Analysis of Finite State Machinesaused by undefined or unspecified behavior of the programming language, including buffer overflows or data races. Sound static analyzers can report all such defects in the code (plus some possible false alarms), or prove their absence. A modern sound analyzer is composed of various abstract domains,作者: 紡織品 時間: 2025-3-27 07:04
Graceful Degradation Design Process for Autonomous Driving Systeml 3 requires the functions to request the driver to take over driving and to sustain safe automated driving until the driver accepts the request if a hardware failure occurs. However, there is a demand to continue automated driving if the system maintains sufficient performance for automated driving作者: 商店街 時間: 2025-3-27 09:39 作者: 古代 時間: 2025-3-27 15:04 作者: Prosaic 時間: 2025-3-27 19:07
Fitness Functions for Testing Automated and Autonomous Driving Systemsdomains of the parameters span a huge space of possible test cases, from which “good” ones have to be selected. Heuristic search, guided by fitness functions, has been proposed as a suitable technique in the past. However, the . has not been addressed yet. We provide templates to formulate fitness f作者: Induction 時間: 2025-3-27 23:32 作者: Decibel 時間: 2025-3-28 02:26
Spectrum-Based Fault Localization in Deployed Embedded Systems with Driver Interaction Modelsded system, which acts autonomously and isolated. The monitoring system generates reports containing probable fault locations, which can later be obtained without requiring expensive debugging hardware or continuous access to the monitored embedded system. For this, we assessed failure-detection ora作者: MIR 時間: 2025-3-28 07:46 作者: 輕浮思想 時間: 2025-3-28 11:08
Digital Forensics in Industrial Control Systemsnges due to a rising number of attacks and errors. The event reconstruction is the goal of the new field of ICS forensics differing from well-established Desktop-IT forensics. We identify ICS properties, implications and the impact on the forensic process..Our primary contribution is the identifcati作者: anticipate 時間: 2025-3-28 17:09 作者: Exclaim 時間: 2025-3-28 21:33 作者: Lipohypertrophy 時間: 2025-3-29 02:17
A Pattern for Arguing the Assurance of Machine Learning in Medical Diagnosis Systemst human performance. The adoption of such systems in the medical domain should not happen, however, unless sufficient assurance can be demonstrated. In this paper we consider the implicit assurance argument for state-of-the-art systems that uses machine-learnt models for clinical diagnosis, e.g. ret作者: browbeat 時間: 2025-3-29 04:55
BACRank: Ranking Building Automation and Control System Components by Business Continuity Impactons. However, BACSs are prone to disruptions caused by failures or active attacks. Given the role BACSs play in critical locations such as airports and hospitals, a comprehensive impact assessment methodology is required that estimates the effect of unavailable components in the system. In this pape作者: ATOPY 時間: 2025-3-29 08:39 作者: hypnotic 時間: 2025-3-29 15:18 作者: 不愿 時間: 2025-3-29 19:21 作者: 培養(yǎng) 時間: 2025-3-29 22:47
Getting Started: Identifying Your Needson of ICS specific properties and their impact on the forensic process in order to foster forensic capabilities and forensic readiness in ICS. An existing model for Desktop-IT forensics is successfully adapted for use in ICS.作者: 我吃花盤旋 時間: 2025-3-30 03:10
0302-9743 d in Turku, Finland, in September 2019...The 16 full and 5 short papers included in this volume were carefully reviewed and selected from 65 submissions. They were organized in topical sections named: formal verification; autonomous driving; safety and reliability modeling; security engineering and 作者: archaeology 時間: 2025-3-30 04:53
Conference proceedings 2019, Finland, in September 2019...The 16 full and 5 short papers included in this volume were carefully reviewed and selected from 65 submissions. They were organized in topical sections named: formal verification; autonomous driving; safety and reliability modeling; security engineering and risk asses作者: troponins 時間: 2025-3-30 08:55 作者: 說笑 時間: 2025-3-30 14:34 作者: SLAG 時間: 2025-3-30 17:21 作者: Confound 時間: 2025-3-30 21:18 作者: ACRID 時間: 2025-3-31 03:50 作者: 變態(tài) 時間: 2025-3-31 08:15 作者: 含鐵 時間: 2025-3-31 12:16