標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 26th International C Francesca Saglietti,Norbert Oster Conference proceedings 2007 Springer-Ver [打印本頁] 作者: 教條 時(shí)間: 2025-3-21 17:40
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: 有偏見 時(shí)間: 2025-3-21 21:18
Goal-Based Safety Cases for Medical Devices: Opportunities and Challengescreasingly being done by demonstrating that certain goals have been achieved, rather than by simply following prescriptive standards. Such goal-based safety cases could be a valuable tool for reasoning about safety in healthcare organisations, such as hospitals. System-wide safety cases are very com作者: 引水渠 時(shí)間: 2025-3-22 02:58 作者: 不能根除 時(shí)間: 2025-3-22 05:11 作者: 脆弱么 時(shí)間: 2025-3-22 11:48
Modelling Interdependencies Between the Electricity and Information Infrastructuresity infrastructure and the associated information infrastructure. The interdependencies of these two infrastructures are increasing due to a growing connection of the power grid networks to the global information infrastructure, as a consequence of market deregulation and opening. These interdepende作者: 使害怕 時(shí)間: 2025-3-22 15:42 作者: 使害怕 時(shí)間: 2025-3-22 17:32 作者: 珊瑚 時(shí)間: 2025-3-23 01:07
Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systurity architecture, including a network and application-level firewall with intrusion detection systems. The XTT methodology allows for hierarchical design, and on-line analysis of rule-based systems. It is applied using the Unified Firewall Model, allowing for implementation-agnostic formal design 作者: animated 時(shí)間: 2025-3-23 04:21
RAMSS Analysis for a Co-operative Integrated Traffic Management Systemaffic management is implemented by intelligent services interfacing vehicles, drivers, road infrastructure and operators. These services involve various types of smart systems and wireless communications and have different impact on safety. Therefore, a RAMSS analysis has been carried out in the ini作者: Lipoprotein(A) 時(shí)間: 2025-3-23 08:46 作者: 命令變成大炮 時(shí)間: 2025-3-23 12:12 作者: 阻撓 時(shí)間: 2025-3-23 16:45 作者: enflame 時(shí)間: 2025-3-23 21:45
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safeinformation security in emerging information technology (IT) infrastructure for distribution of safety-critical and business-critical airplane software and data. We present our threat analysis with related security objectives and state functional and assurance requirements necessary to achieve the o作者: 面包屑 時(shí)間: 2025-3-23 23:24 作者: pineal-gland 時(shí)間: 2025-3-24 03:44 作者: erythema 時(shí)間: 2025-3-24 09:01 作者: 溺愛 時(shí)間: 2025-3-24 13:11
Conference proceedings 2007essing technical problems and engineering solutions across the border between safety-related and securi- related concerns. Thereactiontoourcallforpaperswasparticularlygratifyingandimpressive, including 136 full papers submitted by authors representing 29 countries from Europe,Asia, North and South A作者: 積云 時(shí)間: 2025-3-24 17:00 作者: hegemony 時(shí)間: 2025-3-24 22:29
Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake Syault tree analysis. The large number of different combinations of subsystems contributing to failure scenarios was managed by a specially developed program for automatic generation of combinatorial fault trees. The most important result was the proof of the quantitative safety targets of the brake system to the regulating body.作者: companion 時(shí)間: 2025-3-25 02:36 作者: maladorit 時(shí)間: 2025-3-25 05:47 作者: 嘴唇可修剪 時(shí)間: 2025-3-25 08:21
Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systesign, and on-line analysis of rule-based systems. It is applied using the Unified Firewall Model, allowing for implementation-agnostic formal design and verification of firewalls. UFM extension aimed at integration with ModSecurity HTTP firewall are introduced.作者: 集中營(yíng) 時(shí)間: 2025-3-25 11:53 作者: photopsia 時(shí)間: 2025-3-25 18:21 作者: manifestation 時(shí)間: 2025-3-25 20:02 作者: Induction 時(shí)間: 2025-3-26 03:37
Contributions to Management Scienceipped and connected with an IP based protocol via unique IP addresses. Therefore, our work should motivate the inserting of security mechanisms into the design, implementation and configuration of the car IT systems from the beginning of the development, which we substantiate by practical demo attacks on recent automotive technology.作者: burnish 時(shí)間: 2025-3-26 06:32 作者: V切開 時(shí)間: 2025-3-26 10:09
Goal-Based Safety Cases for Medical Devices: Opportunities and Challengeshealthcare and from other industries, and illustrate how these can inform the development of an appropriate safety argument. Finally, we discuss opportunities and challenges for the development and use of goal-based safety cases in healthcare.作者: 傷心 時(shí)間: 2025-3-26 14:18
Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk Assessmentipped and connected with an IP based protocol via unique IP addresses. Therefore, our work should motivate the inserting of security mechanisms into the design, implementation and configuration of the car IT systems from the beginning of the development, which we substantiate by practical demo attacks on recent automotive technology.作者: anthesis 時(shí)間: 2025-3-26 18:05
Handling Malicious Code on Control Systemsicious code classifications include time-dependent, data-dependent, behavior-dependent, input-dependent, violation of a certain theorem, and so on. Finally, the paper presents possible approaches to prevention and detection of malicious code on control systems.作者: Infantry 時(shí)間: 2025-3-26 21:07 作者: 掃興 時(shí)間: 2025-3-27 02:43
Contributions to Management Scienceto interdependencies. We address failures in the electricity infrastructure, in combination with accidental failures in the information infrastructure, then we show briefly how malicious attacks in the information infrastructure can be addressed.作者: 易改變 時(shí)間: 2025-3-27 06:27 作者: 共棲 時(shí)間: 2025-3-27 10:16
Modelling Interdependencies Between the Electricity and Information Infrastructuresto interdependencies. We address failures in the electricity infrastructure, in combination with accidental failures in the information infrastructure, then we show briefly how malicious attacks in the information infrastructure can be addressed.作者: fulcrum 時(shí)間: 2025-3-27 16:43 作者: PHAG 時(shí)間: 2025-3-27 20:03 作者: overture 時(shí)間: 2025-3-27 23:40 作者: 使熄滅 時(shí)間: 2025-3-28 06:06
Management of Groups and Group Keys in Multi-level Security Environmentsssification levels. Such access control environment enforces access to documents at multiple security classification levels, starting from the membership in the group, then access to particular group applications, then access to individual documents and finally even their sections.作者: 概觀 時(shí)間: 2025-3-28 08:06 作者: 教唆 時(shí)間: 2025-3-28 12:28
https://doi.org/10.1007/978-3-7908-2118-5creasingly being done by demonstrating that certain goals have been achieved, rather than by simply following prescriptive standards. Such goal-based safety cases could be a valuable tool for reasoning about safety in healthcare organisations, such as hospitals. System-wide safety cases are very com作者: BINGE 時(shí)間: 2025-3-28 17:37
Contributions to Management Scienceer a wide spectrum of network applications, in particular electronic distribution of software (EDS), and onboard collection and off-board retrieval of airplane health reports. On the other hand, airplane safety may be heavily dependent on the security of data transported in these applications. The F作者: Communal 時(shí)間: 2025-3-28 21:42
Contributions to Management Sciencend service distribution it is expected to continue its influence to future system design. Motivated from this successful spreading we assume hypothetical scenarios in our paper, whereby automotive components might also be influenced by omnipresent communication in near future. If such a development 作者: Ascendancy 時(shí)間: 2025-3-29 00:29
Contributions to Management Scienceity infrastructure and the associated information infrastructure. The interdependencies of these two infrastructures are increasing due to a growing connection of the power grid networks to the global information infrastructure, as a consequence of market deregulation and opening. These interdepende作者: Filibuster 時(shí)間: 2025-3-29 05:53
https://doi.org/10.1007/978-3-030-36426-7lack of security protection of most automated control systems is a vulnerable point. In order to ensure security in control systems, it is urgent to investigate the issue of potential malicious code, especially that made by insiders. This paper first discusses the undecidability of identifying all k作者: Gerontology 時(shí)間: 2025-3-29 08:36
https://doi.org/10.1007/978-3-030-36426-7ssification levels. Such access control environment enforces access to documents at multiple security classification levels, starting from the membership in the group, then access to particular group applications, then access to individual documents and finally even their sections.作者: 支架 時(shí)間: 2025-3-29 14:19 作者: 政府 時(shí)間: 2025-3-29 18:22
https://doi.org/10.1007/978-3-030-36426-7affic management is implemented by intelligent services interfacing vehicles, drivers, road infrastructure and operators. These services involve various types of smart systems and wireless communications and have different impact on safety. Therefore, a RAMSS analysis has been carried out in the ini作者: impaction 時(shí)間: 2025-3-29 22:22 作者: Delude 時(shí)間: 2025-3-30 03:35 作者: temperate 時(shí)間: 2025-3-30 06:02
https://doi.org/10.1007/978-3-540-75101-4Processing; Unified Modeling Language (UML); access control; cognitive systems; communication; computer r作者: 細(xì)節(jié) 時(shí)間: 2025-3-30 11:22 作者: countenance 時(shí)間: 2025-3-30 13:19
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233738.jpg