標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 43rd International C Andrea Ceccarelli,Mario Trapp,Friedemann Bitsch Conference proceedings 202 [打印本頁(yè)] 作者: 嚴(yán)厲 時(shí)間: 2025-3-21 17:20
書(shū)目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書(shū)目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書(shū)目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Computer Safety, Reliability, and Security被引頻次
書(shū)目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書(shū)目名稱Computer Safety, Reliability, and Security年度引用
書(shū)目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書(shū)目名稱Computer Safety, Reliability, and Security讀者反饋
書(shū)目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: 漂亮才會(huì)豪華 時(shí)間: 2025-3-21 23:00 作者: 延期 時(shí)間: 2025-3-22 03:00
https://doi.org/10.1007/978-3-031-68606-1distributed and real-time monitoring and control; Fault-tolerant and resilient hardware and software 作者: inveigh 時(shí)間: 2025-3-22 08:33 作者: 舞蹈編排 時(shí)間: 2025-3-22 12:44
Nikita Zhivotovskiy,Steve Hannekeions of weights, loaded from main memory into the internal buffers of CNN accelerators, are repeatedly used in the inference process. Accidental and malicious bit-flips targeting these buffers may negatively impact the CNN’s accuracy. This paper proposes a methodology to tolerate the effect of (mult作者: Lacunar-Stroke 時(shí)間: 2025-3-22 14:21
Achilles A. Beros,Ziyuan Gao,Sandra Zillesrt the argumentation of completeness and correctness of a system architectural design with respect to faults” (ISO?26262). We argue that a library of failure models facilitates this process. Such a library, firstly, supports completeness claims through, e.g., an extensive and systematic collection p作者: Lacunar-Stroke 時(shí)間: 2025-3-22 19:48 作者: 健壯 時(shí)間: 2025-3-22 22:17
Rupert H?lzl,Sanjay Jain,Frank Stephanssurance artifacts of a safety case. The focus is mainly on the ., whose underlying risk assessment model gives the concrete link from safety measurement to operational risk. Using an aviation domain example of autonomous taxiing, we describe our approach to derive safety indicators and revise the r作者: adhesive 時(shí)間: 2025-3-23 03:40 作者: Intercept 時(shí)間: 2025-3-23 07:13 作者: 逃避系列單詞 時(shí)間: 2025-3-23 10:41 作者: 發(fā)酵 時(shí)間: 2025-3-23 16:11
https://doi.org/10.1007/978-3-031-13603-0at that company that will likely have lasting effects throughout the industry. Issues stem not just from the loss events themselves, but also from how Cruise mishandled dealing with their robotaxi dragging a pedestrian under the vehicle after the initial post-crash stop. External investigation repor作者: 營(yíng)養(yǎng) 時(shí)間: 2025-3-23 21:23 作者: fertilizer 時(shí)間: 2025-3-24 00:45 作者: 搖擺 時(shí)間: 2025-3-24 03:29 作者: Trypsin 時(shí)間: 2025-3-24 10:21 作者: 大包裹 時(shí)間: 2025-3-24 12:06 作者: BIAS 時(shí)間: 2025-3-24 18:32
Kolmogorov Complexity of Finite Stringsement strategies that take all three into account. This paper introduces a novel framework that seamlessly combines attack trees, fault trees, and defense mechanisms: Attack-Fault-Defense Trees (AFDTs). This model creates a common language using an easily understood visual aid designed for experts f作者: Mortal 時(shí)間: 2025-3-24 19:13 作者: 討好女人 時(shí)間: 2025-3-24 23:35
https://doi.org/10.1007/978-3-031-06649-8n combining distributed Datalog-based programs with tamper-proof storage based on Trillian to verify the premises of critical actions. We demonstrate?our monitoring approach on an industrial use case that uses a?cloud infrastructure for the orchestration of unmanned air vehicles.作者: Antarctic 時(shí)間: 2025-3-25 04:29
Law, Governance and Technology Seriestep toward continuous assurance argument, we have prototyped a system for monitoring operational parameters such as speed of oncoming vehicles, ensuring the values remain within the assumed ranges. The GSN diagram with other documents such as safety analysis documents and operational monitoring data will be available via a web-based GSN tool.作者: Hemiparesis 時(shí)間: 2025-3-25 08:51
Kolmogorov Complexity of Finite Stringsualitative analysis can be done through cut set analysis. Furthermore, we provide a case study that revolves around a Gridshield lab, which?is a set of remotely connected charging stations at the University of Twente campus, to demonstrate the practical implementation of AFDT analysis.作者: ATRIA 時(shí)間: 2025-3-25 15:33
Strategic Resilience Evaluation of?Neural Networks Within Autonomous Vehicle Softwarefies corner cases of DNN vulnerabilities that can cause hazards and accidents and therefore dramatically affect AV safety. Additionally, we evaluate mitigation mechanisms of such vulnerabilities for both AV agents and discuss the insights of this study.作者: 草率男 時(shí)間: 2025-3-25 19:21 作者: 乳白光 時(shí)間: 2025-3-25 23:39
A Case Study of?Continuous Assurance Argument for?Level 4 Automated Drivingtep toward continuous assurance argument, we have prototyped a system for monitoring operational parameters such as speed of oncoming vehicles, ensuring the values remain within the assumed ranges. The GSN diagram with other documents such as safety analysis documents and operational monitoring data will be available via a web-based GSN tool.作者: 切掉 時(shí)間: 2025-3-26 03:52
Safety-Security Analysis via?Attack-Fault-Defense Trees: Semantics and?Cut Set Metricsualitative analysis can be done through cut set analysis. Furthermore, we provide a case study that revolves around a Gridshield lab, which?is a set of remotely connected charging stations at the University of Twente campus, to demonstrate the practical implementation of AFDT analysis.作者: 玩笑 時(shí)間: 2025-3-26 07:24 作者: WAG 時(shí)間: 2025-3-26 10:04
Conference proceedings 2024e been organized in topical sections as follows:?Fault Injection and Tolerance;?System and Software Safety Assurance;?Automated Driving Systems;?Security of safety-critical systems;?Safety Verification; and?Autonomous Systems..作者: 咽下 時(shí)間: 2025-3-26 16:26
0302-9743 . They have been organized in topical sections as follows:?Fault Injection and Tolerance;?System and Software Safety Assurance;?Automated Driving Systems;?Security of safety-critical systems;?Safety Verification; and?Autonomous Systems..978-3-031-68605-4978-3-031-68606-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Consensus 時(shí)間: 2025-3-26 18:09
Rupert H?lzl,Sanjay Jain,Frank Stephanisk assessment based on safety measurement. We then outline a notion of . between a collection of safety indicators and the safety case, as a formal basis for implementing the proposed framework in our tool, AdvoCATE.作者: evasive 時(shí)間: 2025-3-26 22:37
EU Law on Unfair Commercial Practicesenerating safety assurance from the models. In this work, we demonstrate how the extensive traceability inherent in Workflow. can be leveraged to enable comprehensive safety-related change impact analyses. This facilitates sound incremental safety assurance to complement incremental development already in use.作者: 安裝 時(shí)間: 2025-3-27 02:54 作者: 背景 時(shí)間: 2025-3-27 08:42 作者: colony 時(shí)間: 2025-3-27 11:00 作者: Externalize 時(shí)間: 2025-3-27 14:21 作者: GUMP 時(shí)間: 2025-3-27 18:30 作者: Lumbar-Stenosis 時(shí)間: 2025-3-28 01:36 作者: 遺留之物 時(shí)間: 2025-3-28 03:24 作者: callous 時(shí)間: 2025-3-28 06:14 作者: impaction 時(shí)間: 2025-3-28 13:03
Generalized Conformal Predictionmplex GSN trees using the data, where possible, all automatically. Our pipeline is integrated into an open-source tool with an interactive GUI for generating the GSN fragments and analyzing them in a modular fashion.作者: 配置 時(shí)間: 2025-3-28 17:23
https://doi.org/10.1007/978-3-031-13603-0a post-collision scenario, the inadequacy of a so-called “minimal risk condition” strategy in complex situations, poor organizational discipline in responding to a mishap, overly aggressive post-collision automation choices that made a bad situation worse, and a reluctance to admit to a mishap causi作者: 獨(dú)白 時(shí)間: 2025-3-28 21:58
Domenico Gattuso,Giuseppe Musolino pure software version across different cryptographic payloads. Finally, we provide guidelines for the use of OpenTitan as a coprocessor in secure cyber-physical systems designs based on open-hardware architectures.作者: ascend 時(shí)間: 2025-3-29 02:05 作者: 極少 時(shí)間: 2025-3-29 06:47
In-Memory Zero-Space Floating-Point-Based CNN Protection Using , and?, Bitss do not require protection against faults, they are employed to store the parity bits of error control codes. The methodology preserves the CNN accuracy, keeps its memory footprint, and does not require any retraining. Its usefulness is exemplified through the FP32 and BFloat16 versions of the LeNe作者: 表被動(dòng) 時(shí)間: 2025-3-29 08:30 作者: incision 時(shí)間: 2025-3-29 11:47
Safety Invariant Engineering for?Interlocking Verificationrting all possible violations, and regression testing. We explain how these stages are carried out and which, if any, changes in the toolset they require. The method has been continuously and successfully used in the recent improvements and the extensions of SafeCap while the technology has been app作者: Aids209 時(shí)間: 2025-3-29 19:32
Assurance Case Synthesis from?a?Curated Semantic Triplestoremplex GSN trees using the data, where possible, all automatically. Our pipeline is integrated into an open-source tool with an interactive GUI for generating the GSN fragments and analyzing them in a modular fashion.作者: Spirometry 時(shí)間: 2025-3-29 23:24 作者: Panther 時(shí)間: 2025-3-30 02:08
TitanSSL: Towards Accelerating OpenSSL in?a?Full RISC-V Architecture Using OpenTitan Root-of-Trust pure software version across different cryptographic payloads. Finally, we provide guidelines for the use of OpenTitan as a coprocessor in secure cyber-physical systems designs based on open-hardware architectures.作者: 上下連貫 時(shí)間: 2025-3-30 05:39 作者: LITHE 時(shí)間: 2025-3-30 08:21 作者: 纖細(xì) 時(shí)間: 2025-3-30 13:55
A Failure Model Library for?Simulation-Based Validation of?Functional Safetyrt the argumentation of completeness and correctness of a system architectural design with respect to faults” (ISO?26262). We argue that a library of failure models facilitates this process. Such a library, firstly, supports completeness claims through, e.g., an extensive and systematic collection p作者: 受人支配 時(shí)間: 2025-3-30 17:16 作者: Modicum 時(shí)間: 2025-3-31 00:13 作者: 多余 時(shí)間: 2025-3-31 03:11 作者: ineptitude 時(shí)間: 2025-3-31 08:53 作者: GEST 時(shí)間: 2025-3-31 10:05