找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Safety, Reliability, and Security; 32nd International C Friedemann Bitsch,Jérémie Guiochet,Mohamed Kaanich Conference proceedings

[復(fù)制鏈接]
查看: 39768|回復(fù): 67
樓主
發(fā)表于 2025-3-21 18:58:22 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Computer Safety, Reliability, and Security
副標(biāo)題32nd International C
編輯Friedemann Bitsch,Jérémie Guiochet,Mohamed Kaanich
視頻videohttp://file.papertrans.cn/234/233725/233725.mp4
概述Fast track conference proceedings.Unique visibility.State of the art research
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Computer Safety, Reliability, and Security; 32nd International C Friedemann Bitsch,Jérémie Guiochet,Mohamed Kaanich Conference proceedings
描述.This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013..The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions. The papers are organized in topical sections on safety requirements and assurance, testing and verification, security, software reliability assessment, practical experience reports and tools, safety assurance in automotive, error control codes, dependable user interfaces, and hazard and failure mode analysis..
出版日期Conference proceedings 2013
關(guān)鍵詞critical infrastructures protection; fault tolerance; malware; safety-related embedded system; vulnerabi
版次1
doihttps://doi.org/10.1007/978-3-642-40793-2
isbn_softcover978-3-642-40792-5
isbn_ebook978-3-642-40793-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2013
The information of publication is updating

書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:57:23 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:13:29 | 只看該作者
A Formal Basis for Safety Case Patterns the current state of the practice, patterns exist as descriptive specifications with informal semantics, which not only offer little opportunity for more sophisticated usage such as automated instantiation, composition and manipulation, but also impede standardization efforts and tool interoperabil
地板
發(fā)表于 2025-3-22 08:19:54 | 只看該作者
Testing Autonomous Robot Control Software Using Procedural Content Generationloped for the film and video game industries, to create a diverse range of test situations. We execute these in the Player/Stage robot simulator and automatically rate them for their safety significance using an event-based scoring system. Situations exhibiting dangerous behaviour will score highly,
5#
發(fā)表于 2025-3-22 12:32:47 | 只看該作者
6#
發(fā)表于 2025-3-22 16:37:17 | 只看該作者
Formalisation of an Industrial Approach to Monitoring Critical Datathat the displayed data are sufficiently fresh and non-corrupted constitutes an important part of safety requirements. However, the monitoring subsystems are typically not a part of a safety kernel and hence often built of SIL1–SIL2 components. In this paper, we formalise a recently implemented indu
7#
發(fā)表于 2025-3-22 18:16:41 | 只看該作者
Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties diagnostics equipment for a diagnostics session, even over long distances. However, since the diagnostics equipment contains authentication keys used to authenticate such sessions, it is critical that neither the keys nor the equipment is lost. Such a loss can give unauthorised access to any vehicl
8#
發(fā)表于 2025-3-22 23:41:51 | 只看該作者
9#
發(fā)表于 2025-3-23 01:33:07 | 只看該作者
Does Malware Detection Improve with Diverse AntiVirus Products? An Empirical Studyn a geographically distributed honeypot deployment in several different countries and organizations. The malware was collected in August 2012: the results are relevant to recent and current threats observed in the Internet. We sent these malware to 42 AVs available from the VirusTotal service to eva
10#
發(fā)表于 2025-3-23 07:31:40 | 只看該作者
Software Fault-Freeness and Reliability Predictionss of probabilities of certain behaviours, e.g. as associated to the Safety Integrity Levels of IEC 61508. The two forms of reasoning – about evidence of correctness and about probabilities of certain failures – are rarely brought together explicitly. The desirability of using claims of correctness h
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 02:53
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
永寿县| 汤阴县| 平昌县| 通海县| 东乌珠穆沁旗| 利辛县| 西吉县| 小金县| 台州市| 合肥市| 伊宁县| 体育| 黑龙江省| 徐水县| 天柱县| 崇信县| 山东省| 甘泉县| 凤翔县| 万荣县| 嘉荫县| 武宁县| 麟游县| 崇阳县| 尼玛县| 遵化市| 普宁市| 同江市| 上虞市| 沾化县| 芦溪县| 利辛县| 秀山| 交口县| 大丰市| 交城县| 怀远县| 武城县| 滦南县| 安化县| 吉安市|