派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; 28th International C Bettina Buth,Gerd Rabe,Till Seyfarth Conference proceedings 2009 Springer- [打印本頁]

作者: Coarse    時間: 2025-3-21 18:52
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度學科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名





作者: BYRE    時間: 2025-3-21 22:36

作者: 搖曳的微光    時間: 2025-3-22 03:47
https://doi.org/10.1007/978-1-4613-2453-9oughness of safety-related quality measures and certification activities. Motivated by these considerations, this presentation describes an approach for automated construction and verification of railway control systems.
作者: Aqueous-Humor    時間: 2025-3-22 05:16
https://doi.org/10.1007/b102433sms, with reference to errors of omission when using “alerting systems”, with the help of examples of novel counterintuitive findings we obtained from a case study in a health care application, as well as other examples from the literature.
作者: 語源學    時間: 2025-3-22 09:39

作者: 無目標    時間: 2025-3-22 15:46
https://doi.org/10.1057/978-1-137-43903-1I (Human Machine Interface) is one of the major threats to reliability..After a short overview on COOPERS and the RAMSS analysis, this paper describes the risks of the HMI and human factors in the specific situation of a driver and gives concrete recommendations for the OBU (On-Board Unit) user interface.
作者: 無目標    時間: 2025-3-22 20:25
The Ballads and Songs of W. B. Yeats specific events ready to be tested against the attack signatures. The proposed framework is implemented and evaluated using the most common attack scenarios. The framework is useful to test software with respect to potential attacks which can significantly reduce the risk of security vulnerabilities.
作者: BARGE    時間: 2025-3-23 00:40
A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systemsoughness of safety-related quality measures and certification activities. Motivated by these considerations, this presentation describes an approach for automated construction and verification of railway control systems.
作者: handle    時間: 2025-3-23 02:48
Why Are People’s Decisions Sometimes Worse with Computer Support?sms, with reference to errors of omission when using “alerting systems”, with the help of examples of novel counterintuitive findings we obtained from a case study in a health care application, as well as other examples from the literature.
作者: Horizon    時間: 2025-3-23 06:55
Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Sytion, expert judgment is applied to entire software systems. The results from this approach can be used to identify parts of software which from a complexity viewpoint is eligible for closer inspection. In this paper we describe the approach in detail as well as plans for testing the approach.
作者: 廢除    時間: 2025-3-23 12:10
Safety Requirements for a Cooperative Traffic Management System: The Human Interface PerspectiveI (Human Machine Interface) is one of the major threats to reliability..After a short overview on COOPERS and the RAMSS analysis, this paper describes the risks of the HMI and human factors in the specific situation of a driver and gives concrete recommendations for the OBU (On-Board Unit) user interface.
作者: inspiration    時間: 2025-3-23 15:43
Towards Model-Based Automatic Testing of Attack Scenarios specific events ready to be tested against the attack signatures. The proposed framework is implemented and evaluated using the most common attack scenarios. The framework is useful to test software with respect to potential attacks which can significantly reduce the risk of security vulnerabilities.
作者: 雇傭兵    時間: 2025-3-23 21:55
Exploring Network Security in PROFIsafetack PROFIsafe and change the safety-related process data without any of the safety measures in the protocol detecting the attack. As a countermeasure to network security attacks, the concept of security modules in combination with PROFIsafe will reduce the risk of security attacks, and is in line with the security concept ..
作者: 吞沒    時間: 2025-3-24 01:01

作者: Conclave    時間: 2025-3-24 02:38
Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example os. To motivate appropriate provision for privacy protection in future cars we discuss potential scenarios of privacy violations. To underline the relevance even today, we further present a novel attack on a recent gateway ECU enabling an attacker to sniff arbitrary internal communication even beyond subnetwork borders.
作者: NOVA    時間: 2025-3-24 10:27
Developments in Cardiovascular Medicinenected with the THR defined in the standard EN 50129..We discuss arguments that show, why care is needed when using the PFD. Moreover, we present a reasoning, why a probability of failure on demand (PFD) might be misleading.
作者: 有法律效應    時間: 2025-3-24 11:16

作者: ferment    時間: 2025-3-24 16:09
Probability of Failure on Demand – The Why and the Hownected with the THR defined in the standard EN 50129..We discuss arguments that show, why care is needed when using the PFD. Moreover, we present a reasoning, why a probability of failure on demand (PFD) might be misleading.
作者: perpetual    時間: 2025-3-24 22:41

作者: penance    時間: 2025-3-25 02:06
https://doi.org/10.1007/3-540-37642-9tack PROFIsafe and change the safety-related process data without any of the safety measures in the protocol detecting the attack. As a countermeasure to network security attacks, the concept of security modules in combination with PROFIsafe will reduce the risk of security attacks, and is in line with the security concept ..
作者: Manifest    時間: 2025-3-25 05:27
The Application of Econophysicsent a Stochastic Activity Network model taking into account the system and these environmental factors. Measures resulting from our modeling are aimed at helping the system designers in the assessment of vulnerability exploitation risks.
作者: 包租車船    時間: 2025-3-25 10:52
The US, the Balkans and Détente, 1963–73s. To motivate appropriate provision for privacy protection in future cars we discuss potential scenarios of privacy violations. To underline the relevance even today, we further present a novel attack on a recent gateway ECU enabling an attacker to sniff arbitrary internal communication even beyond subnetwork borders.
作者: Ornament    時間: 2025-3-25 14:15
https://doi.org/10.1007/978-3-540-89656-2e adopted by other companies developing safety-relevant devices. During the audit process it is verified that the documentation of the process is as expected and that the actual development process is performed according to the defined process. This assures for companies adopting the approach that i
作者: Radiculopathy    時間: 2025-3-25 18:04

作者: 閃光你我    時間: 2025-3-25 21:47
Hideki Takayasu (Senior Researcher)ng criticality phenomenon. A toy example based on a real topology is given; SAFE proves to be a reasonably fast, accurate and computationally simple evaluation tool in presence of more than 50% missing data.
作者: 佛刊    時間: 2025-3-26 03:17
The US, the Balkans and Détente, 1963–73BUs have recognized that this is clearly not efficient for redundancy, repetition, and finally costs reasons we have undertaken the task of creating a generic process to be used as framework for developing safety compliant products according to IEC 61508 that can be reused for different products acr
作者: 抱狗不敢前    時間: 2025-3-26 04:51
https://doi.org/10.1057/978-1-137-43903-1 and standard’s recommendations. Missing, negative or conflicting impact indicates impairment of the argument either by revealing a gap in the line of arguments or incompatibilities or opposing principles between decisions or techniques in the process. We show first steps towards the integration of
作者: Corral    時間: 2025-3-26 11:37
https://doi.org/10.1057/978-1-137-43903-1 the safety integrity. It shows how these constraints drive the design of the safety lifecycle model to be developed. Our design concept, design considerations, development strategy, and our experience in establishing such a common safety lifecycle model will also be discussed in the paper.
作者: amenity    時間: 2025-3-26 16:31
https://doi.org/10.1057/978-1-137-43903-1abilistic variants thereof. The precise nature of these techniques together with the formal SLIM semantics yield a trustworthy modeling and analysis framework for system and software engineers supporting, among others, automated derivation of dynamic (i.e., randomly timed) fault trees, FMEA tables,
作者: bisphosphonate    時間: 2025-3-26 20:37

作者: 寬度    時間: 2025-3-27 00:18
Model-Based Development of Medical Devicese adopted by other companies developing safety-relevant devices. During the audit process it is verified that the documentation of the process is as expected and that the actual development process is performed according to the defined process. This assures for companies adopting the approach that i
作者: Substance-Abuse    時間: 2025-3-27 04:02

作者: CRASS    時間: 2025-3-27 05:56
Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorng criticality phenomenon. A toy example based on a real topology is given; SAFE proves to be a reasonably fast, accurate and computationally simple evaluation tool in presence of more than 50% missing data.
作者: 新奇    時間: 2025-3-27 12:30
Experiences with the Certification of a Generic Functional Safety Management Structure According to BUs have recognized that this is clearly not efficient for redundancy, repetition, and finally costs reasons we have undertaken the task of creating a generic process to be used as framework for developing safety compliant products according to IEC 61508 that can be reused for different products acr
作者: 物種起源    時間: 2025-3-27 14:51
Analysing Dependability Case Arguments Using Quality Models and standard’s recommendations. Missing, negative or conflicting impact indicates impairment of the argument either by revealing a gap in the line of arguments or incompatibilities or opposing principles between decisions or techniques in the process. We show first steps towards the integration of
作者: Generator    時間: 2025-3-27 18:01
Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB the safety integrity. It shows how these constraints drive the design of the safety lifecycle model to be developed. Our design concept, design considerations, development strategy, and our experience in establishing such a common safety lifecycle model will also be discussed in the paper.
作者: 完成才會征服    時間: 2025-3-27 23:59

作者: 厚顏無恥    時間: 2025-3-28 03:59
Formal Verification of a Microkernel Used in Dependable Software Systems chain and the verification methodology, (b)?we explain the hardware model and how assembly semantics is specified so that functions whose implementation contain assembly can be verified, and (c)?we describe the verification of the system call itself.
作者: instate    時間: 2025-3-28 10:01
0302-9743 h methods found their way into the application areas; which new approaches need to be checked for their practical applicability. As di?erent application domains978-3-642-04467-0978-3-642-04468-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: strdulate    時間: 2025-3-28 11:44

作者: 不能和解    時間: 2025-3-28 16:03
Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do. However, clear distinctions exist in the design tools. This paper examines what is unique to hardware design, areas where formal methods can be applied to advantage in hardware design and how errors can exist in the hardware even if formal methods are used to prove the design is correct.
作者: 傻    時間: 2025-3-28 21:45
https://doi.org/10.1007/978-1-4613-2453-9increase the traffic throughput while at the same time increasing the availability and reliability of railway operations leads to a demand for more elaborate safety mechanisms in order to keep the risk at the same low level that has been established for European railways until today. The challenge i
作者: HPA533    時間: 2025-3-29 01:26
https://doi.org/10.1007/978-3-540-89656-2s in a medical devices company. The approach described uses a combination of model-driven analysis, model-driven design, model-driven test and model-driven safety analysis. Different approaches have been developed and followed in the past. The approach presented has been developed in an evolutionary
作者: 失望昨天    時間: 2025-3-29 04:57

作者: Parley    時間: 2025-3-29 09:35

作者: 鳴叫    時間: 2025-3-29 12:52
Developments in Cardiovascular Medicines. We describe the philosophies that are standing behind the PFD and the THR. A comparison shows, how the philosophies are connected and which connections between PFH and PFD are implied. Depending on additional parameters, there can be deviations between safety integrity levels that are derived on
作者: 結果    時間: 2025-3-29 16:39

作者: Enervate    時間: 2025-3-29 21:22

作者: 考博    時間: 2025-3-30 03:33
Hideki Takayasu (Senior Researcher)We suggest a simple inclusive index for inter-dependencies and note that even introducing broad simplifications, it is not possible to provide enough information to whatever analysis framework. Hence we resort to a Simulated Annealing–like algorithm (SAFE) to calculate the most probable cascading fa
作者: Intervention    時間: 2025-3-30 04:55

作者: 傻瓜    時間: 2025-3-30 10:08
The US, the Balkans and Détente, 1963–73IEC 61508 for their safety related products. Being part of a large global organization, ABB BUs enjoy certain freedom in the way they implement their product development process both for hardware and software. Many times these processes are inherited from long standing and successful development tra
作者: 無能性    時間: 2025-3-30 14:03

作者: 大罵    時間: 2025-3-30 18:38

作者: 鬧劇    時間: 2025-3-30 21:28
The US, the Balkans and Détente, 1963–73relevance of the black box perspective in the context of threat analyses for automotive IT systems and discuss typical starting points and implications of respective attacks. We put a special focus on potential privacy issues, which we expect to be of increasing relevance in future automotive system
作者: 細絲    時間: 2025-3-31 01:33
https://doi.org/10.1057/978-1-137-43903-1f road-side infrastructure coupled with advanced driver assistance systems and on-board data collection facilities..COOPERS. has the objective of co-operative traffic management by implementing intelligent services interfacing vehicles, drivers, road infrastructure and highway operators. These servi
作者: 壯麗的去    時間: 2025-3-31 05:13
https://doi.org/10.1057/978-1-137-43903-1or the aerospace domain. The approach is supported by a System-Level Integrated Modeling (SLIM) Language by which engineers are provided with convenient ways to describe nominal hardware and software operation, (probabilistic) faults and their propagation, error recovery, and degraded modes of opera
作者: CLASH    時間: 2025-3-31 12:51
The US, the Balkans and Détente, 1963–73he main goal of the BMBF-supported Verisoft XT project is (a)?the creation of methods and tools which allow the pervasive formal verification of integrated computer systems, and (b)?the prototypical realization of four concrete, industrial application tasks..In this paper, we report on the Verisoft
作者: archenemy    時間: 2025-3-31 15:43

作者: 腐爛    時間: 2025-3-31 18:23

作者: Thyroid-Gland    時間: 2025-3-31 23:59





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
苍南县| 揭东县| 太和县| 项城市| 乐平市| 张家界市| 石城县| 南澳县| 竹溪县| 华坪县| 兴业县| 罗城| 池州市| 化州市| 彭山县| 涟水县| 阳泉市| 平定县| 馆陶县| 林芝县| 高邮市| 湄潭县| 乡宁县| 景德镇市| 日土县| 区。| 庄浪县| 九龙城区| 武乡县| 铜梁县| 夹江县| 雷山县| 阿尔山市| 宣城市| 德清县| 余姚市| 高淳县| 大石桥市| 仁怀市| 儋州市| 雅安市|