派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; SAFECOMP 2019 Worksh Alexander Romanovsky,Elena Troubitsyna,Friedemann Conference proceedings [打印本頁]

作者: Curator    時間: 2025-3-21 16:21
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名





作者: Limited    時間: 2025-3-21 20:57
A Modelling Approach for System Life Cycles Assurances understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a v
作者: irreducible    時間: 2025-3-22 04:05

作者: 搜尋    時間: 2025-3-22 08:07
Comparative Evaluation of Security Fuzzing Approachesential for exposing vulnerabilities and the expected effort required to do so. These preliminary considerations based on abstract reasoning and engineering judgement are subsequently confronted with experimental evaluations based on the application of three different fuzzing tools characterized by d
作者: 高談闊論    時間: 2025-3-22 09:01
Assuring Compliance with Protection Profiles with ThreatGetrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.
作者: 藕床生厭倦    時間: 2025-3-22 16:58

作者: 藕床生厭倦    時間: 2025-3-22 20:30
Combined Approach for Safety and Security) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combin
作者: Needlework    時間: 2025-3-22 22:54
Towards Integrated Quantitative Security and Safety Risk Assessment used for combined risk management. This paper presents the existing gaps, based on an overview of available methods, which is followed by the proposal towards a solution to achieve coordinated risk management by applying a quantitative security risk assessment methodology. This methodology extends
作者: Pageant    時間: 2025-3-23 02:44
Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applicationsthods from dependability engineering could be used to identify potential risk relating to safety and security of such applications. The demonstration object of this paper is a sensor network for air quality analysis and dynamic traffic control based on these data.
作者: Ige326    時間: 2025-3-23 07:49
Increasing Safety of Neural Networks in Medical Devicesetworks are used to detect certain medical/decease indications. For example, a potential imminent asthma insult is detected based e.g. on breathing pattern, heart rate, and a few optional additional parameters. The patient receives a warning message and can either change his behavior and/or take som
作者: 兇殘    時間: 2025-3-23 10:26
Smart Wristband for Votingications. The technical advancement of cyber-physical systems (CPS) paved the way for an easy and fast development of Internet of Things (IoT) devices. In this work, a voting wristband that uses hand gestures and the measurement of the corresponding barometric air pressure for voting has been develo
作者: preeclampsia    時間: 2025-3-23 17:46
Automotive Cybersecurity Standards - Relation and Overviewe-, maintenance- and traffic safety features. This highly connected networking also increase the attractiveness of an attack on vehicles and the connected infrastructure by hackers with different motivations and thus introduces new risks for vehicle cybersecurity..Highly aware of this fact, the auto
作者: Devastate    時間: 2025-3-23 18:34

作者: 結(jié)構(gòu)    時間: 2025-3-23 23:55

作者: 侵略者    時間: 2025-3-24 05:40
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Resultsensing and object detection, safe positioning, and broadband radio communication. To prove safety of the SISTER solution, CENELEC-compliant Verification and Validation (V&V) is obviously required. In the SISTER project, we tackled the challenge of defining and applying a compact V&V methodology, abl
作者: 獎牌    時間: 2025-3-24 07:31
0302-9743 ..STRIVE 2019:. Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms..WAISE 2019:. Second International Workshop on Artificial Intelligence Safety Engineering..?.978-3-030-26249-5978-3-030-26250-1Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: ITCH    時間: 2025-3-24 13:20
https://doi.org/10.1007/978-94-009-8668-8tracts. The proposed safety-case architecture is analyzed against possible product-line changes and it is shown that it is robust both with respect to fine and coarse-grained, and also product and implementation-level changes. The proposed modular safety case is exemplified on a simplified, but real
作者: LATER    時間: 2025-3-24 15:40
Seth Michelson,Timothy Schofield security engineering are not widely used at the moment, or practitioners are not aware of this feature. For privacy engineering, the availability and usage of standards, analysis methodologies and software tools are relatively weaker than for safety and security, reflecting the fact that privacy en
作者: beta-carotene    時間: 2025-3-24 21:53

作者: Incommensurate    時間: 2025-3-25 02:07
Judicial Reform and Human Rightshed and published a committee draft of the “ISO-SAE Approved new Work Item (AWI) 21434 Road Vehicles - Cybersecurity Engineering” standard. In addition to that SAE is also working on a set of cybersecurity guidance, ISO is addressing specific automotive cybersecurity related topics in additional sta
作者: dandruff    時間: 2025-3-25 05:14
Modular Safety Cases for Product Lines Based on Assume-Guarantee Contractstracts. The proposed safety-case architecture is analyzed against possible product-line changes and it is shown that it is robust both with respect to fine and coarse-grained, and also product and implementation-level changes. The proposed modular safety case is exemplified on a simplified, but real
作者: 掃興    時間: 2025-3-25 10:26
A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Sys security engineering are not widely used at the moment, or practitioners are not aware of this feature. For privacy engineering, the availability and usage of standards, analysis methodologies and software tools are relatively weaker than for safety and security, reflecting the fact that privacy en
作者: 割讓    時間: 2025-3-25 11:59
Increasing Safety of Neural Networks in Medical Devicese used in order to both increase safety and reliability of a neural network in a medical device. We use a combination of online and offline tests to detect undesired behavior. Online tests are performed in regular intervals during therapy and offline tests are performed when the device is not perfor
作者: 紡織品    時間: 2025-3-25 19:09
Automotive Cybersecurity Standards - Relation and Overviewhed and published a committee draft of the “ISO-SAE Approved new Work Item (AWI) 21434 Road Vehicles - Cybersecurity Engineering” standard. In addition to that SAE is also working on a set of cybersecurity guidance, ISO is addressing specific automotive cybersecurity related topics in additional sta
作者: Adjourn    時間: 2025-3-25 21:59

作者: 花束    時間: 2025-3-26 00:38
Primary Production in the Indian Ocean Ins of safety-critical systems development. We investigate how STAMP and STPA can be related to use of assurance cases. This is done in a generic way by representing the STPA steps as part of the evidence and claim documentations within GSN.
作者: 美食家    時間: 2025-3-26 07:39

作者: urethritis    時間: 2025-3-26 09:33

作者: 朝圣者    時間: 2025-3-26 12:41

作者: Affable    時間: 2025-3-26 19:45

作者: Slit-Lamp    時間: 2025-3-26 23:58
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Resultsf the methodology is to produce V&V results that can be reused for future industrial exploitation of SISTER outcomes after project termination. This paper presents the V&V methodology that is currently applied in parallel to the progress of project activities, with preliminary results from its application.
作者: 減去    時間: 2025-3-27 03:42
Towards Integrated Quantitative Security and Safety Risk Assessmentestablished safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.
作者: 損壞    時間: 2025-3-27 06:16

作者: synchronous    時間: 2025-3-27 11:13
Blue Light-Induced Intracellular Movementshat it is not just the technical assurance that is challenging. It is the entirety of the socio-technical system that supports assurance. In this paper, the second part of the Safety-Security Assurance Framework - the Socio-Technical Model (SSAF STM) is presented as one way of reasoning about these wider issues that make co-assurance difficult.
作者: 砍伐    時間: 2025-3-27 14:07
Structured Reasoning for Socio-Technical Factors of Safety-Security Assurancehat it is not just the technical assurance that is challenging. It is the entirety of the socio-technical system that supports assurance. In this paper, the second part of the Safety-Security Assurance Framework - the Socio-Technical Model (SSAF STM) is presented as one way of reasoning about these wider issues that make co-assurance difficult.
作者: condescend    時間: 2025-3-27 19:35
https://doi.org/10.1007/0-306-46853-0established safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.
作者: 強壯    時間: 2025-3-28 00:14

作者: JAMB    時間: 2025-3-28 02:50
Primary Production in the Indian Ocean IIsurance as data included in?tokens. The intended application is a formulation of the DEOS life cycle model with assurance that it achieves open systems dependability, which is standardised as IEC?62853.
作者: MEAN    時間: 2025-3-28 08:47

作者: 典型    時間: 2025-3-28 12:08

作者: Fretful    時間: 2025-3-28 16:46
https://doi.org/10.1007/978-3-319-76672-0nce mechanism where, the system continuously monitors itself and activates corrective measures in the event of safety-critical failures, thereby aiding the system to sustain a safe behavior at runtime. We illustrate the presented approach by employing an example from autonomous agricultural domain and discuss the case study with initial findings.
作者: 溫和女人    時間: 2025-3-28 20:32

作者: hereditary    時間: 2025-3-29 01:07

作者: bizarre    時間: 2025-3-29 05:29

作者: 松雞    時間: 2025-3-29 08:42

作者: 作嘔    時間: 2025-3-29 13:28

作者: Recessive    時間: 2025-3-29 16:45
Primary Production in the Indian Ocean Ision-critical and safety-critical systems. Goal Structuring Notation (GSN) is the most employed graphical notation for documenting dependability cases. System Theoretic Process Analysis (STPA) is a technique, based on System Theoretic Accidents Model and Process (STAMP), to identify hazardous contro
作者: Ptsd429    時間: 2025-3-29 23:02
Primary Production in the Indian Ocean IIs understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a v
作者: restrain    時間: 2025-3-30 02:48

作者: 救護車    時間: 2025-3-30 06:00

作者: Iniquitous    時間: 2025-3-30 10:11
Seth Michelson,Timothy Schofieldrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.
作者: graphy    時間: 2025-3-30 13:27
Seth Michelson,Timothy Schofieldeed to also comply with security and privacy standards. This paper aims to provide insights into how practitioners apply the standards on safety, security or privacy (Sa/Se/Pr), as well as how they employ Sa/Se/Pr analysis methodologies and software tools to meet such criteria. To this end, we condu
作者: Omnipotent    時間: 2025-3-30 18:03
Design of A Statistical Experiment,) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combin




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
乌兰县| 河曲县| 黎川县| 漳浦县| 遵化市| 富宁县| 光泽县| 曲阜市| 通许县| 乡宁县| 万源市| 托克托县| 新绛县| 深泽县| 西充县| 莲花县| 崇明县| 巴南区| 乌拉特中旗| 肃南| 南木林县| 乐至县| 教育| 洮南市| 公安县| 沧源| 岱山县| 民勤县| 泽库县| 定结县| 六枝特区| 新郑市| 郑州市| 洪洞县| 文化| 阿坝县| 罗平县| 监利县| 同江市| 丰原市| 漯河市|