非决定性 发表于 2025-3-21 19:12:51

书目名称Computer Safety, Reliability, and Security影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0233720<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0233720<br><br>        <br><br>

忧伤 发表于 2025-3-21 20:36:31

Using Process Models in System Assurance the process justifications required in assurance cases for critical systems. We use an example case study to illustrate an implementation of the approach. We describe the advantages that this approach brings for system assurance and the development of critical systems.

召集 发表于 2025-3-22 00:39:49

Composition of Safety Argument Patternssatisfies certain desirable properties. Furthermore, we show that it is always possible to construct complex patterns by omposition in this way. We motivate this work with example patterns extracted from real aviation safety cases, and illustrate the application of the theory on the same.

打包 发表于 2025-3-22 04:43:26

http://reply.papertrans.cn/24/2338/233720/233720_4.png

Isolate 发表于 2025-3-22 11:06:29

Using STPA in an ISO 26262 Compliant Processl hazard analysis techniques. In this paper, we analyze how STPA can be used in an ISO 26262 compliant process. We also provide an excerpt of our application of STPA on an automotive subsystem as per the concept phase of ISO 26262.

Herd-Immunity 发表于 2025-3-22 13:05:38

Automatic Invariant Selection for Online Anomaly Detectionse a general and automatic approach for identifying a subset of mined invariants that properly model system runtime behavior with a reduced amount of background noise. This translates into better overall performance (i.e., less false positives).

Herd-Immunity 发表于 2025-3-22 17:36:30

0302-9743 iability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anom

Nostalgia 发表于 2025-3-22 23:05:21

Linkage Between Stratigraphyand Hydrology,security of one of the most used industrial protocols: OPC-UA. Using ProVerif, a well known cryptographic protocol verification tool, we are able to check secrecy and authentication properties. We find several attacks on the protocols and provide countermeasures.

debase 发表于 2025-3-23 05:19:16

http://reply.papertrans.cn/24/2338/233720/233720_9.png

epinephrine 发表于 2025-3-23 09:11:19

http://reply.papertrans.cn/24/2338/233720/233720_10.png
页: [1] 2 3 4 5
查看完整版本: Titlebook: Computer Safety, Reliability, and Security; 35th International C Amund Skavhaug,Jérémie Guiochet,Friedemann Bitsch Conference proceedings 2