派博傳思國際中心

標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 31st International C Frank Ortmeier,Peter Daniel Conference proceedings 2012 Springer-Verlag Be [打印本頁]

作者: Enkephalin    時間: 2025-3-21 19:56
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名





作者: LEVY    時間: 2025-3-21 23:15

作者: dictator    時間: 2025-3-22 02:37
Model Based Specification, Verification, and Test Generation for a Safety Fieldbus Profileion and developed test generation methods are shown to be applicable after mapping the specification model onto SPENAT. The practical use of this tool chain is exemplarily demonstrated for a safety fieldbus profile.
作者: judicial    時間: 2025-3-22 04:43
Formal Development and Assessment of a Reconfigurable On-board Satellite System discover possible reconfiguration strategy and continue to provide its services despite failures of its vital components. We integrate probabilistic verification to evaluate reconfiguration alternatives. Our approach is illustrated by a case study from aerospace domain.
作者: 老人病學(xué)    時間: 2025-3-22 12:06

作者: NOT    時間: 2025-3-22 14:18
0302-9743 rnational Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analy
作者: NOT    時間: 2025-3-22 20:42

作者: 調(diào)色板    時間: 2025-3-22 22:13

作者: Exclude    時間: 2025-3-23 02:52

作者: 背書    時間: 2025-3-23 09:37
The Underperforming Private Sectoration authorities, security objectives and specifications must be clearly identified thanks to a security risk assessment process. This paper gives main characteristics for a security risk assessment methodology to be integrated in the early design of airborne systems development and compliant with airworthiness security standards.
作者: Invigorate    時間: 2025-3-23 13:06

作者: PIZZA    時間: 2025-3-23 15:02

作者: Parabola    時間: 2025-3-23 20:32

作者: Organization    時間: 2025-3-24 00:10
Governance Challenges in the CFA Zoneverification steps, leading to standard-compliant tool qualification. Our tool qualification method employs fault injection as a validation method to increase confidence in the tool. Our case study will help to avoid many of the new pitfalls that can arise when attempting to realize standard-compliant development.
作者: dialect    時間: 2025-3-24 04:31

作者: 畏縮    時間: 2025-3-24 07:04
https://doi.org/10.1007/978-3-540-74113-8ntal evaluation of CASPER is presented. The obtained results show (i) a very low percentage of false positives over both normal and under stress conditions, and (ii) a sufficiently high failure prediction time that allows the system to apply appropriate recovery procedures.
作者: 歪曲道理    時間: 2025-3-24 13:50

作者: 拱墻    時間: 2025-3-24 16:39

作者: ventilate    時間: 2025-3-24 22:17
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System anystems. On the example of route reconstruction in a hit-and-run scenario, appropriate strategies and tools for selected process steps are proposed. These are exemplarily illustrated by practical tests on real vehicle IT (especially CAN field bus and navigation systems) and applicable ways to route reconstruction are shown.
作者: 天文臺    時間: 2025-3-25 00:06
Online Black-Box Failure Prediction for Mission Critical Distributed Systemsntal evaluation of CASPER is presented. The obtained results show (i) a very low percentage of false positives over both normal and under stress conditions, and (ii) a sufficiently high failure prediction time that allows the system to apply appropriate recovery procedures.
作者: Brochure    時間: 2025-3-25 05:13
Conference proceedings 2012 in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analysis, testing, quantitative analysis, security, formal methods, aeronautic, automotive,
作者: Irrepressible    時間: 2025-3-25 07:34

作者: lactic    時間: 2025-3-25 15:21
https://doi.org/10.1007/978-3-030-71006-4Monte Carlo simulation, Markov analysis and Pandora’s own logical analysis in this solution. These techniques are evaluated and applied to a case study. All three techniques are shown to give essentially the same results.
作者: COUCH    時間: 2025-3-25 18:08

作者: 檔案    時間: 2025-3-25 23:23
A Method for Guided Hazard Identification and Risk Mitigation for Offshore Operations , and (3) developing risk mitigation means. Based on a guided hazard identification process, a formalization of hazardous scenarios will be proposed that unambiguously describes the risks of a given offshore operation. We will demonstrate the feasibility of our approach on a specific offshore scenario.
作者: prosperity    時間: 2025-3-26 03:20

作者: Deference    時間: 2025-3-26 06:19
Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automationon processes as far as possible, and discusses the threats and IT security objectives including typical assumptions in the railway domain. Finally examples of IT security requirements are stated and discussed based on the approach advocated in the Common Criteria, in the form of a protection profile.
作者: Lobotomy    時間: 2025-3-26 08:51

作者: GROUP    時間: 2025-3-26 13:40

作者: Synapse    時間: 2025-3-26 17:14

作者: 現(xiàn)任者    時間: 2025-3-27 00:21
An Ontological Approach to Systematization of?SW-FMEAion process..This also opens the way to the implementation of a tool, built on top of a stack of semantic web technologies, for automating the SW-FMEA process. Results of the application of the methodology and the tool to a real scenario, in which activities and documents are regulated by well-estab
作者: Crumple    時間: 2025-3-27 03:56

作者: Admonish    時間: 2025-3-27 06:26

作者: 從屬    時間: 2025-3-27 11:25

作者: 雀斑    時間: 2025-3-27 16:45
The Macron and Ouattara Reform of the CFAn of different levels of abstraction by . that convert and abstract analysis results. As a case-study, the framework extends and combines three analysis approaches from the MPSoC domain: (I) a BDD-based reliability analysis considers redundancies in the system structure, (II) an analytical behaviora
作者: extract    時間: 2025-3-27 18:55
The Journey: Navigating the COVID-19 Crisis,proposed that simplify the state model by merging similar states to achieve a human readable models even for the complex real world web applications. The obtained model could be used to define formal requirements for the application and to make model checking part of the continuous integration proce
作者: convulsion    時間: 2025-3-28 00:48
Quantifier-Free Equality and Data Structuresion process..This also opens the way to the implementation of a tool, built on top of a stack of semantic web technologies, for automating the SW-FMEA process. Results of the application of the methodology and the tool to a real scenario, in which activities and documents are regulated by well-estab
作者: 匍匐    時間: 2025-3-28 05:51

作者: 老巫婆    時間: 2025-3-28 06:39

作者: 名次后綴    時間: 2025-3-28 14:03

作者: GEST    時間: 2025-3-28 15:30

作者: 火車車輪    時間: 2025-3-28 19:20

作者: Magisterial    時間: 2025-3-29 02:19

作者: 鍍金    時間: 2025-3-29 05:08
The Roadmap for a Better FutureIt extends the 3GPP security architecture for 4G networks, in particular when being part of critical infrastructures. Based on identified requirements it focuses on enhanced protection concepts, aiming to improve implementation security of threatened elements in 4G networks through attack resistant
作者: 邪惡的你    時間: 2025-3-29 09:01

作者: 制定    時間: 2025-3-29 13:20

作者: 的是兄弟    時間: 2025-3-29 15:39
Governance Challenges in the CFA Zones of this tool chain is the use of an UML profile as a specification notation, a simple high level Petri net model called “Safe Petri Net with Attributes” (SPENAT) and analysis methods found in Petri net theory. The developed UML profile contains UML . and UML . for specification modeling. Verificat
作者: 原來    時間: 2025-3-29 23:02
https://doi.org/10.1007/978-3-030-71006-4ith dynamic and temporal gates so it can incorporate sequential failure in its analysis. Pandora is a technique that analyses fault trees logically with three temporal gates (PAND, SAND, POR) in addition to Boolean gates. However, it needs extending so it can probabilistically analyse fault trees. I
作者: 準(zhǔn)則    時間: 2025-3-30 00:44
The Macron and Ouattara Reform of the CFAmeans to increase the reliability of complex embedded systems at several levels of abstraction are available. In fact, their efficient application is a key factor for the successful design of reliable embedded systems. While analysis approaches that evaluate these techniques and their advantages and
作者: Senescent    時間: 2025-3-30 07:55

作者: BRUNT    時間: 2025-3-30 11:58
The Macron and Ouattara Reform of the CFAr almost only denial of service attacks have been successful, but due to several trends, such as the use of commercial IT and communication systems or privatization, the threat potential could increase in the near future. However, up to now, no harmonized IT security requirements for railway automat
作者: 無王時期,    時間: 2025-3-30 14:25

作者: preeclampsia    時間: 2025-3-30 19:12

作者: 指派    時間: 2025-3-30 21:20

作者: Spina-Bifida    時間: 2025-3-31 03:06

作者: Diaphragm    時間: 2025-3-31 05:53
https://doi.org/10.1007/978-3-540-74113-8 This may lead to an increasing rate of transient and intermittent errors in future microprocessors. In order to assess the risk such errors pose to safety critical systems, it is essential to investigate how temporary errors in the instruction set architecture (ISA) registers and main memory locati
作者: 劇毒    時間: 2025-3-31 12:44
Quantifier-Free Equality and Data Structuresize and the weight of the on-board equipments, the designers need to rely on dynamic reconfiguration in case of failures of some components. In this paper we propose a formal approach to development of dynamically reconfigurable systems in Event-B. Our approach allows us to build the system that can
作者: Circumscribe    時間: 2025-3-31 13:49
Quantifier-Free Equality and Data Structures FADEC system. The study focuses on the impact of single bit faults in the instruction set architecture (ISA) registers. For such faults, we investigate the effectiveness of the error detection mechanisms included in the FADEC system, and determine the consequences of errors that escape detection. T
作者: Middle-Ear    時間: 2025-3-31 18:22

作者: Chronic    時間: 2025-4-1 01:20
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233743.jpg
作者: 效果    時間: 2025-4-1 05:04

作者: 輕信    時間: 2025-4-1 09:16





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
汕尾市| 沅陵县| 康平县| 嘉义市| 泸州市| 古交市| 沂南县| 类乌齐县| 遵化市| 肃北| 雷山县| 枝江市| 上饶市| 开鲁县| 石泉县| 株洲市| 新源县| 克拉玛依市| 同仁县| 沾化县| 肥东县| 达日县| 德庆县| 登封市| 共和县| 太和县| 辰溪县| 白朗县| 松原市| 汝城县| 澄江县| 宁河县| 漯河市| 金沙县| 镇宁| 墨玉县| 湾仔区| 沅江市| 阿城市| 六枝特区| 闽清县|