書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops被引頻次
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops年度引用
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops讀者反饋
書目名稱Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops讀者反饋學(xué)科排名
作者: 行乞 時間: 2025-3-21 21:46
A Method to Support the Accountability of Safety Cases by Integrating Safety Analysis and Model-Basetifacts. Increasingly complex in-vehicle systems are making traditional safety analysis artifacts more difficult for reviewers to understand. One of the requirements for improvement is to provide more understandable explanations of failure behaviors. The AIAG/VDA FMEA (Failure Mode and Effect Analys作者: 半身雕像 時間: 2025-3-22 02:14 作者: 不斷的變動 時間: 2025-3-22 04:38 作者: Acclaim 時間: 2025-3-22 09:35 作者: induct 時間: 2025-3-22 14:19
Assurance Case Patterns for Cyber-Physical Systems with Deep Neural Networksrantees about the safety properties of these systems becomes ever more important. Tools for reasoning about the safety of DNN-based systems have started to emerge. In this paper, we show that assurance cases can be used to argue about the safety of CPS with DNNs by proposing assurance case patterns 作者: induct 時間: 2025-3-22 17:28 作者: 說笑 時間: 2025-3-22 23:13
An Instruction Filter for Time-Predictable Code Execution on Standard Processors a timely manner might lead to catastrophic consequences. It is therefore necessary to determine reliable bounds on the execution time of tasks. However, timing analysis, whether done statically using a timing model or based on measurements, struggles with the large number of possible execution path作者: Rotator-Cuff 時間: 2025-3-23 01:49 作者: 流逝 時間: 2025-3-23 06:11 作者: 自作多情 時間: 2025-3-23 10:37
Automated Right of Way for Emergency Vehicles in C-ITS: An Analysis of Cyber-Security Risks of transport systems. Emergency vehicles can benefit from C-ITS by sending preemption requests to traffic lights or other connected road users, thus reducing their time loss when approaching an emergency. This, however, depends on a secure and reliable communication between all involved parties. Po作者: 記成螞蟻 時間: 2025-3-23 17:18
Integrity Checking of Railway Interlocking Firmware higher use cases - particularly safety related domains - where integrity failures can have devastating consequences, eg: StuxNet and Triton. Understanding trusted systems and exploring their operation is complicated by the need for a core and hardware roots of trust, such as TPM module. This can be作者: 假設(shè) 時間: 2025-3-23 19:30
LoRaWAN with HSM as a Security Improvement for Agriculture Applicationsdomain. Digitalization stands for the needed technology to realize the transformation from conventional to modern agriculture. The continuously monitoring of all environmental data and the recording of all work parameters enables data collections, which are used for precise decision making and the p作者: ellagic-acid 時間: 2025-3-24 00:53 作者: chronology 時間: 2025-3-24 03:14 作者: WAIL 時間: 2025-3-24 06:58 作者: cathartic 時間: 2025-3-24 12:44
A Method to Support the Accountability of Safety Cases by Integrating Safety Analysis and Model-Bases using SysML. Based on FTA (Fault Tree Analysis) and FMEA results, along with SysML diagrams (e.g., internal block diagrams), the proposed method imports represent FMEA and FTA data graphically as Hybrid Failure Chains with a system model to improve information cohesion in the safety analysis artif作者: 叫喊 時間: 2025-3-24 17:47 作者: 含沙射影 時間: 2025-3-24 19:52 作者: 礦石 時間: 2025-3-25 02:19 作者: phlegm 時間: 2025-3-25 07:14
Automated Right of Way for Emergency Vehicles in C-ITS: An Analysis of Cyber-Security Riskse Mode and Effects Analysis (FMEA) to assess inherent flaws that could be exploited by cyber-attacks. The results show that, while the technical provisions foreseen by the relevant standards in general provide strong security, detailed security management processes need to be specified.作者: 失誤 時間: 2025-3-25 09:50
LoRaWAN with HSM as a Security Improvement for Agriculture Applicationsly around LoRaWAN applications in agriculture..In the first part, a general assessment of the security situation in modern agriculture, data encryption methods, and the LoRaWAN data communication technology, will be presented..Then, the paper explains the security improvement concept by using a Hard作者: 積極詞匯 時間: 2025-3-25 14:47
0302-9743 hird International Workshop on Artificial Intelligence Safety Engineering..The workshops were held virtually due to the COVID-19 pandemic..978-3-030-55582-5978-3-030-55583-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Nuance 時間: 2025-3-25 16:54 作者: 啜泣 時間: 2025-3-25 22:31
Michael Meyer,Jan Harff,Chris Dytemplates to solve security, safety and privacy issues related to automated systems. The grouping and classification of design patterns is important to facilitate the selection process which is a challenging task and weak classification schemes can be a reason for a sparse application of security pat作者: Fantasy 時間: 2025-3-26 03:42 作者: mastoid-bone 時間: 2025-3-26 07:48 作者: chandel 時間: 2025-3-26 10:05 作者: 磨坊 時間: 2025-3-26 13:27 作者: 考得 時間: 2025-3-26 20:16 作者: 忘川河 時間: 2025-3-27 00:45
Michael Meyer,Jan Harff,Chris Dytplementable against IP-based systems. In this paper, we propose an approach to specifying a generic IP-based networked control system and formalising its security properties. We use the Event-B framework to formally analyse the impact of security attacks on safety properties of the system.作者: Congruous 時間: 2025-3-27 02:06
The Baltic Sea Basin: Introductionthat are amenable to the existing evidence generation tools for these systems. We use case studies of two different autonomous driving scenarios to illustrate the use of the proposed patterns for the construction of these assurance cases.作者: LAP 時間: 2025-3-27 08:13 作者: 殺菌劑 時間: 2025-3-27 13:31
The Bank of Japan, the OECD, and Beyondonitors at each level of processing and integration. In the proposed multi-level monitoring framework, some monitoring properties are formally defined using Event Calculus. We then demonstrate the need for multilevel monitors for faster detection and isolation of attacks by performing data attack and fault injection on a Simulink CPS model.作者: floodgate 時間: 2025-3-27 17:36
0302-9743 fety, Reliability and Security, Lisbon, Portugal, September 2020..The 26 regular papers included in this volume were carefully reviewed and selected from 45 submissions; the book also contains one invited paper. The workshops included in this volume are:..DECSoS 2020:.15th Workshop on Dependable Sma作者: Collision 時間: 2025-3-27 19:56
Conference proceedings 2020ability and Security, Lisbon, Portugal, September 2020..The 26 regular papers included in this volume were carefully reviewed and selected from 45 submissions; the book also contains one invited paper. The workshops included in this volume are:..DECSoS 2020:.15th Workshop on Dependable Smart Embedde作者: 不規(guī)則的跳動 時間: 2025-3-27 22:06
Conference proceedings 2020ds for Dependable Cyber-Physical Systems...USDAI 2020:.First International Workshop on Underpinnings for Safe Distributed AI...WAISE 2020:.Third International Workshop on Artificial Intelligence Safety Engineering..The workshops were held virtually due to the COVID-19 pandemic..作者: 和平主義 時間: 2025-3-28 04:44 作者: 時代 時間: 2025-3-28 09:19
https://doi.org/10.1007/978-3-642-17220-5automatic approach for this interference analysis, performed through fault trees generated from safety and security local analyses. We evaluate and discuss our approach from the perspective of two industrial case studies on the space and medical domains.作者: Amnesty 時間: 2025-3-28 11:20 作者: 純樸 時間: 2025-3-28 18:22
Graham Smith (Fellow, Lecturer in Geography)-simulation framework that enables the simulation of an ADAS application scenario in these two fronts, analyzing the relationship between different vehicle dynamics and the delay required for the system to operate safely, exploring the performance limits of different wireless network configurations.作者: PTCA635 時間: 2025-3-28 22:07 作者: GIDDY 時間: 2025-3-29 00:06 作者: curettage 時間: 2025-3-29 03:29
Safety and Security Interference Analysis in the Design Stageautomatic approach for this interference analysis, performed through fault trees generated from safety and security local analyses. We evaluate and discuss our approach from the perspective of two industrial case studies on the space and medical domains.作者: ENDOW 時間: 2025-3-29 10:00
Safety-Critical Software Development in C++ification for compilers, analyzers and other development tools. This article summarizes the requirements of different safety norms, illustrates development and verification challenges and addresses tool qualification.作者: Conduit 時間: 2025-3-29 12:25 作者: 弄皺 時間: 2025-3-29 17:03 作者: 空氣傳播 時間: 2025-3-29 21:10
Formalising the Impact of Security Attacks on IoT Safetyplementable against IP-based systems. In this paper, we propose an approach to specifying a generic IP-based networked control system and formalising its security properties. We use the Event-B framework to formally analyse the impact of security attacks on safety properties of the system.作者: 萬靈丹 時間: 2025-3-30 03:09 作者: 有特色 時間: 2025-3-30 07:56 作者: 類型 時間: 2025-3-30 11:24
Multilevel Runtime Security and Safety Monitoring for Cyber Physical Systems Using Model-Based Enginonitors at each level of processing and integration. In the proposed multi-level monitoring framework, some monitoring properties are formally defined using Event Calculus. We then demonstrate the need for multilevel monitors for faster detection and isolation of attacks by performing data attack and fault injection on a Simulink CPS model.作者: Prognosis 時間: 2025-3-30 16:23
https://doi.org/10.1007/978-3-030-55583-2artificial intelligence; computer hardware; computer networks; computer programming; computer science; co作者: 圣人 時間: 2025-3-30 19:22
978-3-030-55582-5Springer Nature Switzerland AG 2020作者: 食草 時間: 2025-3-30 21:37
https://doi.org/10.1007/978-1-349-22352-7r control them as malfunctions could be catastrophic. Fault Tree Analysis (FTA) is one of the most widely used methods for safety analysis in industrial use. However, the standard FTA is manual, informal, and limited to static analysis of systems. In this paper, we present preliminary results from a作者: 流浪 時間: 2025-3-31 02:14 作者: 施魔法 時間: 2025-3-31 08:13