書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: chronology 時(shí)間: 2025-3-21 21:13 作者: 子女 時(shí)間: 2025-3-22 04:16 作者: 勾引 時(shí)間: 2025-3-22 08:33 作者: extract 時(shí)間: 2025-3-22 12:32 作者: 隨意 時(shí)間: 2025-3-22 15:03
The 6W1H Model as a Basis for Systems Assurance Argumentsaster management system out of existing documents is a non-trivial task. We propose an approach applying 6W1H models. A 6W1H model is a tree of actions equipped with “6Ws” (Who, What, Whom, When, Where, Why) that provide necessary explication of the system for assurance argument. The approach is ex作者: 隨意 時(shí)間: 2025-3-22 18:14
The Assurance Timeline: Building Assurance Cases for Synthetic Biologyc biology engineers manipulate and modify living organisms to change (and produce entirely novel) functionality, which has led to new fuel sources or the ability to mitigate pollution. Synthetic biology research is also expected to lead to methods of intelligent drug delivery. In synthetic biology, 作者: 刪除 時(shí)間: 2025-3-23 01:10
Towards Safety Case Integration with Hazard Analysis for Medical Devicesper we present a method of safety case integration with hazard tables based on the use of parametrized argument patterns. We describe a hazard table metamodel, a safety argument pattern and a mechanism of pattern instantiation using a linking table which represents references to system lifecycle art作者: Enrage 時(shí)間: 2025-3-23 02:50 作者: Lumbar-Stenosis 時(shí)間: 2025-3-23 07:56
Quantitative Reliability Assessment for Mobile Cooperative Systemsetri Net models of cooperative behaviour, it analyses different sources of randomness and defines an automatic test case generation procedure to derive cooperative scenarios according to a given operational profile. As an example, the approach is applied to a model of trolleys moving within a common作者: 我吃花盤旋 時(shí)間: 2025-3-23 10:00 作者: AV-node 時(shí)間: 2025-3-23 17:38 作者: dialect 時(shí)間: 2025-3-23 20:17
Using SAE J3061 for Automotive Security Requirement Engineeringeminent in recent years. Consequently, cybersecurity must be adequately addressed among other dependability attributes such as safety and reliability in the automotive domain. J3061, officially published in January 2016 by SAE International, is a much anticipated standard for cybersecurity for the a作者: 討好女人 時(shí)間: 2025-3-23 22:46
Dynamic Safety Contracts for Functional Cooperation of Automotive Systemsistributed systems. Besides mutual awareness, they should provide a deeper integration on the level of functional cooperation. By today, runtime aspects of system adaptation for functional safety are not sufficiently addressed. As predicted for the near future, especially collaboration scenarios of 作者: Graphite 時(shí)間: 2025-3-24 03:02 作者: 知道 時(shí)間: 2025-3-24 07:17 作者: 種子 時(shí)間: 2025-3-24 11:09 作者: 外來 時(shí)間: 2025-3-24 16:00 作者: 健談的人 時(shí)間: 2025-3-24 22:55
Developing SNS Tool for Consensus Building on Environmental Safety Using Assurance Cases, and conduct an experiment for the effectiveness of the tool. The preliminary result indicates that the tool based on GSN is statistically significantly effective for sharing correct radiation information with citizens.作者: 過份艷麗 時(shí)間: 2025-3-25 01:18
The Assurance Timeline: Building Assurance Cases for Synthetic Biology replication that involves mutations, they will eventually adapt and evolve new behavior over time. In this paper we propose the use of an assurance case for synthetically engineered organisms, and present an orthogonal dimension, an assurance timeline, that can be used to reason about the dynamic, 作者: 壓倒 時(shí)間: 2025-3-25 06:13 作者: 靈敏 時(shí)間: 2025-3-25 11:20
Limitation and Improvement of STPA-Sec for Safety and Security Co-analysisof high level security scenarios. We evaluate the feasibility of the improved co-analysis method in a self-optimizing battery management system. We also discuss the general applicability of STPA-Sec to high level safety and security analysis and the relation to automotive cybersecurity standards.作者: 民間傳說 時(shí)間: 2025-3-25 14:14
Security Services for Mixed-Criticality Systems Based on Networked Multi-core Chips provide secure communication, time synchronization and resource management for the architecture. This paper defines the required security properties to harden the DREAMS architecture against malicious attacks. The security properties are mapped to concrete security services that serve as basis for 作者: Individual 時(shí)間: 2025-3-25 16:42 作者: 到婚嫁年齡 時(shí)間: 2025-3-25 22:53 作者: Custodian 時(shí)間: 2025-3-26 03:58 作者: 神圣在玷污 時(shí)間: 2025-3-26 07:47
A Defense of the Bayesian Choice, possible to increase speed and robustness by using Time-of-Flight 3D image sensors for communication. Finally, we show how communication partners can be localized and how location-aware communication can greatly benefit secured communication by mitigating relay and denial-of-service attacks.作者: Repatriate 時(shí)間: 2025-3-26 09:15 作者: 地牢 時(shí)間: 2025-3-26 13:33 作者: 宿醉 時(shí)間: 2025-3-26 19:39
https://doi.org/10.1007/978-3-319-45480-1cyber-physical systems; embedded systems; internet of things; quality of service; systems modeling; authe作者: 含沙射影 時(shí)間: 2025-3-26 22:17 作者: 關(guān)心 時(shí)間: 2025-3-27 02:26 作者: 臭了生氣 時(shí)間: 2025-3-27 06:19 作者: Enzyme 時(shí)間: 2025-3-27 13:29
Information Sources on and Around S-Plus,nt amount of time and efforts to be produced. Moreover, safety critical systems are expected to operate for a long period of time and constantly subject to changes during both development and operational phases. Hence, safety cases are built as living documents that should always be maintained to ju作者: FATAL 時(shí)間: 2025-3-27 17:27
Information Sources on and Around S-Plus,y critical context. One reason for this is that model checkers often provide only incomplete results when used on real code due to restrictions placed on the environment of the system in order to facilitate the verification. In order to use these results as evidence in an assurance case, one needs t作者: Assignment 時(shí)間: 2025-3-27 20:09
Information Sources on and Around S-Plus, design. In the context of safety-critical systems, their use for reuse of safety assurance efforts has encountered some challenges: the need for evidence supporting the confidence in the contracts; and the challenge of context, where contracts need to impose different requirements on different syst作者: FLUSH 時(shí)間: 2025-3-28 00:18
Information Sources on and Around S-Plus,the systems involves various stakeholders including professionals, governments, and ordinary citizens. Therefore, for the safety of systems and the environments, consensus building among various stakeholders (e.g., professionals, developers, government, citizens) is crucial. However, ordinary citize作者: 眨眼 時(shí)間: 2025-3-28 04:34 作者: floodgate 時(shí)間: 2025-3-28 06:42 作者: Measured 時(shí)間: 2025-3-28 12:11
Information Sources on and Around S-Plus,per we present a method of safety case integration with hazard tables based on the use of parametrized argument patterns. We describe a hazard table metamodel, a safety argument pattern and a mechanism of pattern instantiation using a linking table which represents references to system lifecycle art作者: 整頓 時(shí)間: 2025-3-28 15:01 作者: Mast-Cell 時(shí)間: 2025-3-28 18:52 作者: 表狀態(tài) 時(shí)間: 2025-3-29 01:15 作者: Palpitation 時(shí)間: 2025-3-29 03:10
Information Sources on and Around S-Plus,-critical systems on chip (SoCs). Virtual prototypes (VPs) based on transaction-level models are employed to speed-up safety verification. However, VP structures correlate poorly to GL models. This leads to the injection of pseudo-faults into VPs and to the development of suboptimal safety mechanism作者: 忙碌 時(shí)間: 2025-3-29 10:27
https://doi.org/10.1007/0-387-28390-0eminent in recent years. Consequently, cybersecurity must be adequately addressed among other dependability attributes such as safety and reliability in the automotive domain. J3061, officially published in January 2016 by SAE International, is a much anticipated standard for cybersecurity for the a作者: Campaign 時(shí)間: 2025-3-29 14:49 作者: fidelity 時(shí)間: 2025-3-29 19:15 作者: 動(dòng)物 時(shí)間: 2025-3-29 20:01
Admissibility and Complete Classes,approaches for safety and security analysis to address the challenges. System-Theoretic Process Analysis (STPA) is a top-down safety hazard analysis method, based on systems theory especially aimed at such systems. In contrast to established approaches, hazards are treated as a control problem rathe作者: 流浪者 時(shí)間: 2025-3-30 02:25 作者: 個(gè)阿姨勾引你 時(shí)間: 2025-3-30 04:31
Amund Skavhaug,Jérémie Guiochet,Friedemann BitschIncludes supplementary material: 作者: Proponent 時(shí)間: 2025-3-30 12:14 作者: 音樂戲劇 時(shí)間: 2025-3-30 16:26 作者: Enervate 時(shí)間: 2025-3-30 20:35
Information Sources on and Around S-Plus,ns equipped with “6Ws” (Who, What, Whom, When, Where, Why) that provide necessary explication of the system for assurance argument. The approach is exemplified by identifying a system and building an assurance case out of water supply activities prescribed in the Local Disaster Management Plan of Hiratsuka city.作者: 傲慢物 時(shí)間: 2025-3-30 23:48
Information Sources on and Around S-Plus,g of value and time errors. That the approach presented here works for distributed, time-triggered systems that process data cyclically and reserve resources exclusively for testing purposes has been demonstrated by an industry study confirming the feasibility of the concepts for a fail-operational electric car.作者: CODA 時(shí)間: 2025-3-31 04:19 作者: Atheroma 時(shí)間: 2025-3-31 07:55 作者: 頂點(diǎn) 時(shí)間: 2025-3-31 12:36 作者: 辯論 時(shí)間: 2025-3-31 15:07 作者: 蝕刻 時(shí)間: 2025-3-31 20:31 作者: Arbitrary 時(shí)間: 2025-3-31 22:13
An Approach for Systematic In-the-Loop Simulations for Development and Test of a Complex Mechatronicld be replaced with simulation models, various kinds of in-the-loop simulations, ranging from MiL to HiL, can be consequently acquired. Additionally, we present a mathematical model of MESes required to formally describe the approach and also a healthcare case study to which our approach was applied.作者: Absenteeism 時(shí)間: 2025-4-1 05:44 作者: cruise 時(shí)間: 2025-4-1 07:20
Conference proceedings 2016 Reliability, and Security, held in Trondheim, Norway, in September 2016...The 30 revised full papers presented together with 4 short and 5 invited papers were carefully reviewed and selected from numerous submissions. This year’s workshop are: ASSURE 2016 - Assurance Cases for Software-intensive Sy