標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 31st International C Frank Ortmeier,Peter Daniel Conference proceedings 2012 Springer-Verlag Be [打印本頁] 作者: Enkephalin 時間: 2025-3-21 19:56
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: LEVY 時間: 2025-3-21 23:15 作者: dictator 時間: 2025-3-22 02:37
Model Based Specification, Verification, and Test Generation for a Safety Fieldbus Profileion and developed test generation methods are shown to be applicable after mapping the specification model onto SPENAT. The practical use of this tool chain is exemplarily demonstrated for a safety fieldbus profile.作者: judicial 時間: 2025-3-22 04:43
Formal Development and Assessment of a Reconfigurable On-board Satellite System discover possible reconfiguration strategy and continue to provide its services despite failures of its vital components. We integrate probabilistic verification to evaluate reconfiguration alternatives. Our approach is illustrated by a case study from aerospace domain.作者: 老人病學(xué) 時間: 2025-3-22 12:06 作者: NOT 時間: 2025-3-22 14:18
0302-9743 rnational Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analy作者: NOT 時間: 2025-3-22 20:42 作者: 調(diào)色板 時間: 2025-3-22 22:13 作者: Exclude 時間: 2025-3-23 02:52 作者: 背書 時間: 2025-3-23 09:37
The Underperforming Private Sectoration authorities, security objectives and specifications must be clearly identified thanks to a security risk assessment process. This paper gives main characteristics for a security risk assessment methodology to be integrated in the early design of airborne systems development and compliant with airworthiness security standards.作者: Invigorate 時間: 2025-3-23 13:06 作者: PIZZA 時間: 2025-3-23 15:02 作者: Parabola 時間: 2025-3-23 20:32 作者: Organization 時間: 2025-3-24 00:10
Governance Challenges in the CFA Zoneverification steps, leading to standard-compliant tool qualification. Our tool qualification method employs fault injection as a validation method to increase confidence in the tool. Our case study will help to avoid many of the new pitfalls that can arise when attempting to realize standard-compliant development.作者: dialect 時間: 2025-3-24 04:31 作者: 畏縮 時間: 2025-3-24 07:04
https://doi.org/10.1007/978-3-540-74113-8ntal evaluation of CASPER is presented. The obtained results show (i) a very low percentage of false positives over both normal and under stress conditions, and (ii) a sufficiently high failure prediction time that allows the system to apply appropriate recovery procedures.作者: 歪曲道理 時間: 2025-3-24 13:50 作者: 拱墻 時間: 2025-3-24 16:39 作者: ventilate 時間: 2025-3-24 22:17
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System anystems. On the example of route reconstruction in a hit-and-run scenario, appropriate strategies and tools for selected process steps are proposed. These are exemplarily illustrated by practical tests on real vehicle IT (especially CAN field bus and navigation systems) and applicable ways to route reconstruction are shown.作者: 天文臺 時間: 2025-3-25 00:06
Online Black-Box Failure Prediction for Mission Critical Distributed Systemsntal evaluation of CASPER is presented. The obtained results show (i) a very low percentage of false positives over both normal and under stress conditions, and (ii) a sufficiently high failure prediction time that allows the system to apply appropriate recovery procedures.作者: Brochure 時間: 2025-3-25 05:13
Conference proceedings 2012 in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analysis, testing, quantitative analysis, security, formal methods, aeronautic, automotive, 作者: Irrepressible 時間: 2025-3-25 07:34 作者: lactic 時間: 2025-3-25 15:21
https://doi.org/10.1007/978-3-030-71006-4Monte Carlo simulation, Markov analysis and Pandora’s own logical analysis in this solution. These techniques are evaluated and applied to a case study. All three techniques are shown to give essentially the same results.作者: COUCH 時間: 2025-3-25 18:08 作者: 檔案 時間: 2025-3-25 23:23
A Method for Guided Hazard Identification and Risk Mitigation for Offshore Operations , and (3) developing risk mitigation means. Based on a guided hazard identification process, a formalization of hazardous scenarios will be proposed that unambiguously describes the risks of a given offshore operation. We will demonstrate the feasibility of our approach on a specific offshore scenario.作者: prosperity 時間: 2025-3-26 03:20 作者: Deference 時間: 2025-3-26 06:19
Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automationon processes as far as possible, and discusses the threats and IT security objectives including typical assumptions in the railway domain. Finally examples of IT security requirements are stated and discussed based on the approach advocated in the Common Criteria, in the form of a protection profile.作者: Lobotomy 時間: 2025-3-26 08:51 作者: GROUP 時間: 2025-3-26 13:40 作者: Synapse 時間: 2025-3-26 17:14 作者: 現(xiàn)任者 時間: 2025-3-27 00:21
An Ontological Approach to Systematization of?SW-FMEAion process..This also opens the way to the implementation of a tool, built on top of a stack of semantic web technologies, for automating the SW-FMEA process. Results of the application of the methodology and the tool to a real scenario, in which activities and documents are regulated by well-estab作者: Crumple 時間: 2025-3-27 03:56 作者: Admonish 時間: 2025-3-27 06:26 作者: 從屬 時間: 2025-3-27 11:25 作者: 雀斑 時間: 2025-3-27 16:45
The Macron and Ouattara Reform of the CFAn of different levels of abstraction by . that convert and abstract analysis results. As a case-study, the framework extends and combines three analysis approaches from the MPSoC domain: (I) a BDD-based reliability analysis considers redundancies in the system structure, (II) an analytical behaviora作者: extract 時間: 2025-3-27 18:55
The Journey: Navigating the COVID-19 Crisis,proposed that simplify the state model by merging similar states to achieve a human readable models even for the complex real world web applications. The obtained model could be used to define formal requirements for the application and to make model checking part of the continuous integration proce作者: convulsion 時間: 2025-3-28 00:48
Quantifier-Free Equality and Data Structuresion process..This also opens the way to the implementation of a tool, built on top of a stack of semantic web technologies, for automating the SW-FMEA process. Results of the application of the methodology and the tool to a real scenario, in which activities and documents are regulated by well-estab作者: 匍匐 時間: 2025-3-28 05:51 作者: 老巫婆 時間: 2025-3-28 06:39 作者: 名次后綴 時間: 2025-3-28 14:03 作者: GEST 時間: 2025-3-28 15:30 作者: 火車車輪 時間: 2025-3-28 19:20 作者: Magisterial 時間: 2025-3-29 02:19 作者: 鍍金 時間: 2025-3-29 05:08
The Roadmap for a Better FutureIt extends the 3GPP security architecture for 4G networks, in particular when being part of critical infrastructures. Based on identified requirements it focuses on enhanced protection concepts, aiming to improve implementation security of threatened elements in 4G networks through attack resistant 作者: 邪惡的你 時間: 2025-3-29 09:01 作者: 制定 時間: 2025-3-29 13:20 作者: 的是兄弟 時間: 2025-3-29 15:39
Governance Challenges in the CFA Zones of this tool chain is the use of an UML profile as a specification notation, a simple high level Petri net model called “Safe Petri Net with Attributes” (SPENAT) and analysis methods found in Petri net theory. The developed UML profile contains UML . and UML . for specification modeling. Verificat作者: 原來 時間: 2025-3-29 23:02
https://doi.org/10.1007/978-3-030-71006-4ith dynamic and temporal gates so it can incorporate sequential failure in its analysis. Pandora is a technique that analyses fault trees logically with three temporal gates (PAND, SAND, POR) in addition to Boolean gates. However, it needs extending so it can probabilistically analyse fault trees. I作者: 準(zhǔn)則 時間: 2025-3-30 00:44
The Macron and Ouattara Reform of the CFAmeans to increase the reliability of complex embedded systems at several levels of abstraction are available. In fact, their efficient application is a key factor for the successful design of reliable embedded systems. While analysis approaches that evaluate these techniques and their advantages and作者: Senescent 時間: 2025-3-30 07:55 作者: BRUNT 時間: 2025-3-30 11:58
The Macron and Ouattara Reform of the CFAr almost only denial of service attacks have been successful, but due to several trends, such as the use of commercial IT and communication systems or privatization, the threat potential could increase in the near future. However, up to now, no harmonized IT security requirements for railway automat作者: 無王時期, 時間: 2025-3-30 14:25 作者: preeclampsia 時間: 2025-3-30 19:12 作者: 指派 時間: 2025-3-30 21:20 作者: Spina-Bifida 時間: 2025-3-31 03:06 作者: Diaphragm 時間: 2025-3-31 05:53
https://doi.org/10.1007/978-3-540-74113-8 This may lead to an increasing rate of transient and intermittent errors in future microprocessors. In order to assess the risk such errors pose to safety critical systems, it is essential to investigate how temporary errors in the instruction set architecture (ISA) registers and main memory locati作者: 劇毒 時間: 2025-3-31 12:44
Quantifier-Free Equality and Data Structuresize and the weight of the on-board equipments, the designers need to rely on dynamic reconfiguration in case of failures of some components. In this paper we propose a formal approach to development of dynamically reconfigurable systems in Event-B. Our approach allows us to build the system that can作者: Circumscribe 時間: 2025-3-31 13:49
Quantifier-Free Equality and Data Structures FADEC system. The study focuses on the impact of single bit faults in the instruction set architecture (ISA) registers. For such faults, we investigate the effectiveness of the error detection mechanisms included in the FADEC system, and determine the consequences of errors that escape detection. T作者: Middle-Ear 時間: 2025-3-31 18:22 作者: Chronic 時間: 2025-4-1 01:20
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233743.jpg作者: 效果 時間: 2025-4-1 05:04 作者: 輕信 時間: 2025-4-1 09:16