Curator 发表于 2025-3-21 16:21:38
书目名称Computer Safety, Reliability, and Security影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0233729<br><br> <br><br>书目名称Computer Safety, Reliability, and Security读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0233729<br><br> <br><br>Limited 发表于 2025-3-21 20:57:46
A Modelling Approach for System Life Cycles Assurances understood than the former, due partly to the lack of consensus on what a ‘life cycle model’ is. This paper proposes a formulation of life cycle models that aims to clarify what it means to assure that a life cycle so modelled achieves expected outcomes. Dependent Petri Net life cycle model is a virreducible 发表于 2025-3-22 04:05:05
http://reply.papertrans.cn/24/2338/233729/233729_3.png搜寻 发表于 2025-3-22 08:07:30
Comparative Evaluation of Security Fuzzing Approachesential for exposing vulnerabilities and the expected effort required to do so. These preliminary considerations based on abstract reasoning and engineering judgement are subsequently confronted with experimental evaluations based on the application of three different fuzzing tools characterized by d高谈阔论 发表于 2025-3-22 09:01:00
Assuring Compliance with Protection Profiles with ThreatGetrting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.藕床生厌倦 发表于 2025-3-22 16:58:21
http://reply.papertrans.cn/24/2338/233729/233729_6.png藕床生厌倦 发表于 2025-3-22 20:30:45
Combined Approach for Safety and Security) have become increasingly complex. We can not consider these dependability attributes in isolation, therefore, combined approaches for safety, security and other attributes are required. In this document, we provide a matrix based approach (inspired from ANP (Analytical Network Process)) for combinNeedlework 发表于 2025-3-22 22:54:54
Towards Integrated Quantitative Security and Safety Risk Assessment used for combined risk management. This paper presents the existing gaps, based on an overview of available methods, which is followed by the proposal towards a solution to achieve coordinated risk management by applying a quantitative security risk assessment methodology. This methodology extendsPageant 发表于 2025-3-23 02:44:10
Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applicationsthods from dependability engineering could be used to identify potential risk relating to safety and security of such applications. The demonstration object of this paper is a sensor network for air quality analysis and dynamic traffic control based on these data.Ige326 发表于 2025-3-23 07:49:44
Increasing Safety of Neural Networks in Medical Devicesetworks are used to detect certain medical/decease indications. For example, a potential imminent asthma insult is detected based e.g. on breathing pattern, heart rate, and a few optional additional parameters. The patient receives a warning message and can either change his behavior and/or take som