派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; 40th International C Ibrahim Habli,Mark Sujan,Friedemann Bitsch Conference proceedings 2021 Spr [打印本頁]

作者: Halloween    時間: 2025-3-21 19:46
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名





作者: Opponent    時間: 2025-3-21 23:14
https://doi.org/10.1007/978-94-011-6361-3l/command or navigation systems. Recently, as an example, many research papers have focused on the ACAS Xu LUT compression. In this work, we explore how to make such a compression while preserving the system safety and offering adequate means of certification.
作者: 是突襲    時間: 2025-3-22 02:25
https://doi.org/10.1007/978-3-030-83903-1artificial intelligence; computer hardware; computer networks; computer programming; computer science; co
作者: 厚顏    時間: 2025-3-22 05:42
978-3-030-83902-4Springer Nature Switzerland AG 2021
作者: 記憶法    時間: 2025-3-22 09:13

作者: Mortar    時間: 2025-3-22 15:39
https://doi.org/10.1007/978-94-011-6361-3d changes in image contrast. While the robustness of DNN classifiers has been the subject of intense research in recent years, the solutions delivered by this research focus on verifying DNN robustness to small perturbations in the images being classified, with perturbation magnitude measured using
作者: Mortar    時間: 2025-3-22 20:22
The Beecham Manual for Family Practiceritical systems. However, current AI-based models are data-driven, so we cannot assure that they will provide the intended outcome for any input. To obtain information about the uncertainty remaining in their outcome, uncertainty estimation capabilities can be integrated during model building. Howev
作者: IDEAS    時間: 2025-3-22 22:49

作者: 典型    時間: 2025-3-23 04:23

作者: calamity    時間: 2025-3-23 08:21

作者: jabber    時間: 2025-3-23 13:46
The Beecham Manual for Family Practiceing vehicle operation has not yet received much attention. In this work, we describe a context-aware scheme for automated road vehicles that assesses the risk of security incidents intending to automatically identify adequate countermeasures. We specifically focus on attack propagation, as related w
作者: preservative    時間: 2025-3-23 16:47

作者: 佛刊    時間: 2025-3-23 22:00

作者: gene-therapy    時間: 2025-3-24 01:22
The Beecham Manual for Family PracticeLs). Products within an SPL vary from each other in terms of which features they include. Applying existing analysis techniques to SPLs and their safety cases is usually challenging because of the potentially exponential number of products with respect to the number of supported features. In this pa
作者: Interstellar    時間: 2025-3-24 03:15
The Beecham Manual for Family Practice method applied during the assurance process is described including the sources of evidence and deviations from previous ISO 26262 based approaches. The paper highlights how the choice of machine learning approach supports the assurance case, especially regarding the inherent explainability of the a
作者: HILAR    時間: 2025-3-24 07:58
The Beecham Manual for Family Practicecially, blind corners pose a critical scenario, in which infrastructure-based sensors can provide more safety. The automation of vehicles is usually tied to an argument on improved safety. However, current standards still rely on the awareness of humans to avoid collisions, which is limited at corne
作者: 下船    時間: 2025-3-24 10:58
The Beecham Manual for Family Practicecal components. This work attempts to ease this labour-intensive process by using machine learning-based fault injection to discover representative hazardous situations. Using a Simulation-Aided Hazard Analysis and Risk Assessment (SAHARA) methodology, a visualisation and suggested hazard classifica
作者: 發(fā)誓放棄    時間: 2025-3-24 16:12

作者: atopic-rhinitis    時間: 2025-3-24 21:16
https://doi.org/10.1007/978-94-009-7334-3s. However, the inclusion of trained agents in automotive systems exposes the vehicle to novel attacks and faults, that can result in safety threats to the driving tasks. In this paper we report our experimental campaign on the injection of adversarial attacks and software faults in a self-driving a
作者: AIL    時間: 2025-3-25 00:28

作者: 甜瓜    時間: 2025-3-25 03:56

作者: 顛簸下上    時間: 2025-3-25 08:59

作者: Dignant    時間: 2025-3-25 14:30
Evaluation Framework for Performance Limitation of Autonomous Systems Under Sensor Attackety analysis for scenario identification, and scenario-based simulation with sensor attack models embedded. Given an autonomous system model, we identify hazard scenarios caused by sensor attacks, and evaluate the performance limitations in the scenarios. We report on a prototype simulator for auton
作者: Postulate    時間: 2025-3-25 19:33
ISO/SAE 21434-Based Risk Assessment of Security Incidents in Automated Road?Vehicles. Since the expected damage of a security incident also depends on the vehicle context, we include information such as speed, time, and traffic density into the risk computation. Based on the resulting risk value, the vehicle selects and realizes a compensating (safety) action. Finally, we discuss o
作者: trigger    時間: 2025-3-25 23:00
Safety Case Maintenance: A Systematic Literature Reviewthan the number of the actually impacted elements. Also, there is limited quantitative impact assessment. Further, existing approaches only address a few system change scenarios when providing guidelines for updating the safety case.
作者: Collision    時間: 2025-3-26 04:03
Safe Interaction of Automated Forklifts and Humans at Blind Corners in a Warehouse with Infrastructu mitigate these faults and gracefully degrades performance if required. Within our extensive evaluation, we use a warehouse simulation to verify our approach and to estimate the impact on an automated forklift’s performance.
作者: surrogate    時間: 2025-3-26 05:47
https://doi.org/10.1007/978-94-011-6361-3oth testing and formal verification; (3) the generation of contextually relevant counterexamples; and, through these, (4) the selection of DNN image classifiers suitable for the operational context (i) envisaged when a potentially safety-critical system is designed, or (ii) observed by a deployed sy
作者: DIKE    時間: 2025-3-26 08:43
The Beecham Manual for Family Practicerform in comparison to in-model approaches, we benchmarked them against deep ensembles, which can be considered the gold standard for in-model uncertainty estimation, as well as to the softmax outputs of a deep neural network as a baseline. Despite a slightly higher Brier score, the UW provides othe
作者: 打擊    時間: 2025-3-26 14:11
https://doi.org/10.1007/978-94-011-6361-3ety analysis for scenario identification, and scenario-based simulation with sensor attack models embedded. Given an autonomous system model, we identify hazard scenarios caused by sensor attacks, and evaluate the performance limitations in the scenarios. We report on a prototype simulator for auton
作者: Leisureliness    時間: 2025-3-26 20:13

作者: 艦旗    時間: 2025-3-26 22:36
The Beecham Manual for Family Practicethan the number of the actually impacted elements. Also, there is limited quantitative impact assessment. Further, existing approaches only address a few system change scenarios when providing guidelines for updating the safety case.
作者: defuse    時間: 2025-3-27 02:34
The Beecham Manual for Family Practice mitigate these faults and gracefully degrades performance if required. Within our extensive evaluation, we use a warehouse simulation to verify our approach and to estimate the impact on an automated forklift’s performance.
作者: 多余    時間: 2025-3-27 08:58
Conference proceedings 2021ce in York, UK, in September 2021..The 17 full papers included in this volume were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: machine learning safety assurance; security engineering; safety and assurance cases; machine learning applicatio
作者: 性冷淡    時間: 2025-3-27 11:13

作者: textile    時間: 2025-3-27 14:48

作者: 沒血色    時間: 2025-3-27 21:19
https://doi.org/10.1007/978-94-011-6361-3locate flaws in a model when one or more claims cannot be substantiated. An implementation of the approach as a part of the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) toolchain has also been demonstrated along with a case study of a package delivery drone.
作者: 不規(guī)則的跳動    時間: 2025-3-27 23:30

作者: 詞匯記憶方法    時間: 2025-3-28 03:22

作者: Hangar    時間: 2025-3-28 07:18
Automating the Assembly of Security Assurance Case Fragmentslocate flaws in a model when one or more claims cannot be substantiated. An implementation of the approach as a part of the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) toolchain has also been demonstrated along with a case study of a package delivery drone.
作者: 男生如果明白    時間: 2025-3-28 14:07
Attack and Fault Injection in Self-driving Agents on the Carla Simulator – erely jeopardize safety. The paper shows a feasible and easily-reproducible approach based on open source simulator and tools, and the results clearly motivate the need of both protective measures and extensive testing campaigns.
作者: GROVE    時間: 2025-3-28 16:01

作者: 災(zāi)難    時間: 2025-3-28 21:07

作者: 露天歷史劇    時間: 2025-3-29 00:18
The Beecham Manual for Family Practicetion is then presented for the safety engineer. We demonstrate this SAHARA methodology using machine learning-based fault injection on a safety-critical use case of an adaptive cruise control system, to show that our approach can discover, visualise, and classify hazardous situations in a (semi-)automated manner in around twenty minutes.
作者: Condescending    時間: 2025-3-29 05:44

作者: Arthritis    時間: 2025-3-29 07:42

作者: conquer    時間: 2025-3-29 13:04
The Beecham Manual for Family Practicehine learning for a comparatively simple function. This allowed the authors to develop a convincing assurance case, whilst identifying pragmatic considerations in the application of machine learning for safety-relevant functions.
作者: omnibus    時間: 2025-3-29 15:58
The Beecham Manual for Family Practicele based on a real-world use-case. The proposed metrics, if they provide no advantage to guided test generation techniques over random ones, helped us trim the generated configuration landscape to identify safety gaps.
作者: COLIC    時間: 2025-3-29 20:25
Towards Certified Analysis of Software Product Line Safety Casesroofs..We apply this infrastructure to formalize and lift a Change Impact Assessment (CIA) algorithm. We present a formal definition of the lifted algorithm, outline its correctness proof (with the full machine-checked proof available online), and discuss its implementation within a model management framework.
作者: 最后一個    時間: 2025-3-30 01:47

作者: Aprope    時間: 2025-3-30 04:29
SASSI: Safety Analysis Using Simulation-Based Situation Coverage for Cobot Systemsle based on a real-world use-case. The proposed metrics, if they provide no advantage to guided test generation techniques over random ones, helped us trim the generated configuration landscape to identify safety gaps.
作者: 遺產(chǎn)    時間: 2025-3-30 09:19

作者: 公豬    時間: 2025-3-30 15:55

作者: 消音器    時間: 2025-3-30 19:43
Towards Certification of a Reduced Footprint ACAS-Xu System: A Hybrid ML-Based Solutionl/command or navigation systems. Recently, as an example, many research papers have focused on the ACAS Xu LUT compression. In this work, we explore how to make such a compression while preserving the system safety and offering adequate means of certification.
作者: Demulcent    時間: 2025-3-30 22:07
IT Design for Resiliency Using Extreme Value Analysise probability to materialise. Owing to this, rare events have to be factored when designing for millions of safe operating hours. In this paper, we apply a statistical paradigm named Extreme Value analysis for the modeling of the rare events and probabilistic risk assessment. Without loss of general
作者: 談判    時間: 2025-3-31 04:53





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
五莲县| 垦利县| 沾化县| 邵武市| 盐山县| 大城县| 青铜峡市| 庆阳市| 渭南市| 广汉市| 兴仁县| 福建省| 贡嘎县| 兰西县| 海晏县| 琼结县| 芮城县| 什邡市| 吉木乃县| 新沂市| 民勤县| 合江县| 洛浦县| 晋中市| 广丰县| 麦盖提县| 大新县| 建宁县| 宁南县| 南开区| 杭州市| 青阳县| 三台县| 西畴县| 满洲里市| 涟源市| 马关县| 巴青县| 东丽区| 顺义区| 梨树县|