標題: Titlebook: Computer Safety, Reliability, and Security; 40th International C Ibrahim Habli,Mark Sujan,Friedemann Bitsch Conference proceedings 2021 Spr [打印本頁] 作者: Halloween 時間: 2025-3-21 19:46
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: Opponent 時間: 2025-3-21 23:14
https://doi.org/10.1007/978-94-011-6361-3l/command or navigation systems. Recently, as an example, many research papers have focused on the ACAS Xu LUT compression. In this work, we explore how to make such a compression while preserving the system safety and offering adequate means of certification.作者: 是突襲 時間: 2025-3-22 02:25
https://doi.org/10.1007/978-3-030-83903-1artificial intelligence; computer hardware; computer networks; computer programming; computer science; co作者: 厚顏 時間: 2025-3-22 05:42
978-3-030-83902-4Springer Nature Switzerland AG 2021作者: 記憶法 時間: 2025-3-22 09:13 作者: Mortar 時間: 2025-3-22 15:39
https://doi.org/10.1007/978-94-011-6361-3d changes in image contrast. While the robustness of DNN classifiers has been the subject of intense research in recent years, the solutions delivered by this research focus on verifying DNN robustness to small perturbations in the images being classified, with perturbation magnitude measured using 作者: Mortar 時間: 2025-3-22 20:22
The Beecham Manual for Family Practiceritical systems. However, current AI-based models are data-driven, so we cannot assure that they will provide the intended outcome for any input. To obtain information about the uncertainty remaining in their outcome, uncertainty estimation capabilities can be integrated during model building. Howev作者: IDEAS 時間: 2025-3-22 22:49 作者: 典型 時間: 2025-3-23 04:23 作者: calamity 時間: 2025-3-23 08:21 作者: jabber 時間: 2025-3-23 13:46
The Beecham Manual for Family Practiceing vehicle operation has not yet received much attention. In this work, we describe a context-aware scheme for automated road vehicles that assesses the risk of security incidents intending to automatically identify adequate countermeasures. We specifically focus on attack propagation, as related w作者: preservative 時間: 2025-3-23 16:47 作者: 佛刊 時間: 2025-3-23 22:00 作者: gene-therapy 時間: 2025-3-24 01:22
The Beecham Manual for Family PracticeLs). Products within an SPL vary from each other in terms of which features they include. Applying existing analysis techniques to SPLs and their safety cases is usually challenging because of the potentially exponential number of products with respect to the number of supported features. In this pa作者: Interstellar 時間: 2025-3-24 03:15
The Beecham Manual for Family Practice method applied during the assurance process is described including the sources of evidence and deviations from previous ISO 26262 based approaches. The paper highlights how the choice of machine learning approach supports the assurance case, especially regarding the inherent explainability of the a作者: HILAR 時間: 2025-3-24 07:58
The Beecham Manual for Family Practicecially, blind corners pose a critical scenario, in which infrastructure-based sensors can provide more safety. The automation of vehicles is usually tied to an argument on improved safety. However, current standards still rely on the awareness of humans to avoid collisions, which is limited at corne作者: 下船 時間: 2025-3-24 10:58
The Beecham Manual for Family Practicecal components. This work attempts to ease this labour-intensive process by using machine learning-based fault injection to discover representative hazardous situations. Using a Simulation-Aided Hazard Analysis and Risk Assessment (SAHARA) methodology, a visualisation and suggested hazard classifica作者: 發(fā)誓放棄 時間: 2025-3-24 16:12 作者: atopic-rhinitis 時間: 2025-3-24 21:16
https://doi.org/10.1007/978-94-009-7334-3s. However, the inclusion of trained agents in automotive systems exposes the vehicle to novel attacks and faults, that can result in safety threats to the driving tasks. In this paper we report our experimental campaign on the injection of adversarial attacks and software faults in a self-driving a作者: AIL 時間: 2025-3-25 00:28 作者: 甜瓜 時間: 2025-3-25 03:56 作者: 顛簸下上 時間: 2025-3-25 08:59 作者: Dignant 時間: 2025-3-25 14:30
Evaluation Framework for Performance Limitation of Autonomous Systems Under Sensor Attackety analysis for scenario identification, and scenario-based simulation with sensor attack models embedded. Given an autonomous system model, we identify hazard scenarios caused by sensor attacks, and evaluate the performance limitations in the scenarios. We report on a prototype simulator for auton作者: Postulate 時間: 2025-3-25 19:33
ISO/SAE 21434-Based Risk Assessment of Security Incidents in Automated Road?Vehicles. Since the expected damage of a security incident also depends on the vehicle context, we include information such as speed, time, and traffic density into the risk computation. Based on the resulting risk value, the vehicle selects and realizes a compensating (safety) action. Finally, we discuss o作者: trigger 時間: 2025-3-25 23:00
Safety Case Maintenance: A Systematic Literature Reviewthan the number of the actually impacted elements. Also, there is limited quantitative impact assessment. Further, existing approaches only address a few system change scenarios when providing guidelines for updating the safety case.作者: Collision 時間: 2025-3-26 04:03
Safe Interaction of Automated Forklifts and Humans at Blind Corners in a Warehouse with Infrastructu mitigate these faults and gracefully degrades performance if required. Within our extensive evaluation, we use a warehouse simulation to verify our approach and to estimate the impact on an automated forklift’s performance.作者: surrogate 時間: 2025-3-26 05:47
https://doi.org/10.1007/978-94-011-6361-3oth testing and formal verification; (3) the generation of contextually relevant counterexamples; and, through these, (4) the selection of DNN image classifiers suitable for the operational context (i) envisaged when a potentially safety-critical system is designed, or (ii) observed by a deployed sy作者: DIKE 時間: 2025-3-26 08:43
The Beecham Manual for Family Practicerform in comparison to in-model approaches, we benchmarked them against deep ensembles, which can be considered the gold standard for in-model uncertainty estimation, as well as to the softmax outputs of a deep neural network as a baseline. Despite a slightly higher Brier score, the UW provides othe作者: 打擊 時間: 2025-3-26 14:11
https://doi.org/10.1007/978-94-011-6361-3ety analysis for scenario identification, and scenario-based simulation with sensor attack models embedded. Given an autonomous system model, we identify hazard scenarios caused by sensor attacks, and evaluate the performance limitations in the scenarios. We report on a prototype simulator for auton作者: Leisureliness 時間: 2025-3-26 20:13 作者: 艦旗 時間: 2025-3-26 22:36
The Beecham Manual for Family Practicethan the number of the actually impacted elements. Also, there is limited quantitative impact assessment. Further, existing approaches only address a few system change scenarios when providing guidelines for updating the safety case.作者: defuse 時間: 2025-3-27 02:34
The Beecham Manual for Family Practice mitigate these faults and gracefully degrades performance if required. Within our extensive evaluation, we use a warehouse simulation to verify our approach and to estimate the impact on an automated forklift’s performance.作者: 多余 時間: 2025-3-27 08:58
Conference proceedings 2021ce in York, UK, in September 2021..The 17 full papers included in this volume were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: machine learning safety assurance; security engineering; safety and assurance cases; machine learning applicatio作者: 性冷淡 時間: 2025-3-27 11:13 作者: textile 時間: 2025-3-27 14:48 作者: 沒血色 時間: 2025-3-27 21:19
https://doi.org/10.1007/978-94-011-6361-3locate flaws in a model when one or more claims cannot be substantiated. An implementation of the approach as a part of the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) toolchain has also been demonstrated along with a case study of a package delivery drone.作者: 不規(guī)則的跳動 時間: 2025-3-27 23:30 作者: 詞匯記憶方法 時間: 2025-3-28 03:22 作者: Hangar 時間: 2025-3-28 07:18
Automating the Assembly of Security Assurance Case Fragmentslocate flaws in a model when one or more claims cannot be substantiated. An implementation of the approach as a part of the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) toolchain has also been demonstrated along with a case study of a package delivery drone.作者: 男生如果明白 時間: 2025-3-28 14:07
Attack and Fault Injection in Self-driving Agents on the Carla Simulator – erely jeopardize safety. The paper shows a feasible and easily-reproducible approach based on open source simulator and tools, and the results clearly motivate the need of both protective measures and extensive testing campaigns.作者: GROVE 時間: 2025-3-28 16:01 作者: 災(zāi)難 時間: 2025-3-28 21:07 作者: 露天歷史劇 時間: 2025-3-29 00:18
The Beecham Manual for Family Practicetion is then presented for the safety engineer. We demonstrate this SAHARA methodology using machine learning-based fault injection on a safety-critical use case of an adaptive cruise control system, to show that our approach can discover, visualise, and classify hazardous situations in a (semi-)automated manner in around twenty minutes.作者: Condescending 時間: 2025-3-29 05:44 作者: Arthritis 時間: 2025-3-29 07:42 作者: conquer 時間: 2025-3-29 13:04
The Beecham Manual for Family Practicehine learning for a comparatively simple function. This allowed the authors to develop a convincing assurance case, whilst identifying pragmatic considerations in the application of machine learning for safety-relevant functions.作者: omnibus 時間: 2025-3-29 15:58
The Beecham Manual for Family Practicele based on a real-world use-case. The proposed metrics, if they provide no advantage to guided test generation techniques over random ones, helped us trim the generated configuration landscape to identify safety gaps.作者: COLIC 時間: 2025-3-29 20:25
Towards Certified Analysis of Software Product Line Safety Casesroofs..We apply this infrastructure to formalize and lift a Change Impact Assessment (CIA) algorithm. We present a formal definition of the lifted algorithm, outline its correctness proof (with the full machine-checked proof available online), and discuss its implementation within a model management framework.作者: 最后一個 時間: 2025-3-30 01:47 作者: Aprope 時間: 2025-3-30 04:29
SASSI: Safety Analysis Using Simulation-Based Situation Coverage for Cobot Systemsle based on a real-world use-case. The proposed metrics, if they provide no advantage to guided test generation techniques over random ones, helped us trim the generated configuration landscape to identify safety gaps.作者: 遺產(chǎn) 時間: 2025-3-30 09:19 作者: 公豬 時間: 2025-3-30 15:55 作者: 消音器 時間: 2025-3-30 19:43
Towards Certification of a Reduced Footprint ACAS-Xu System: A Hybrid ML-Based Solutionl/command or navigation systems. Recently, as an example, many research papers have focused on the ACAS Xu LUT compression. In this work, we explore how to make such a compression while preserving the system safety and offering adequate means of certification.作者: Demulcent 時間: 2025-3-30 22:07
IT Design for Resiliency Using Extreme Value Analysise probability to materialise. Owing to this, rare events have to be factored when designing for millions of safe operating hours. In this paper, we apply a statistical paradigm named Extreme Value analysis for the modeling of the rare events and probabilistic risk assessment. Without loss of general作者: 談判 時間: 2025-3-31 04:53