Flagging 发表于 2025-3-26 23:03:52

Drafting a Cybersecurity Framework Profile for Smart Grids in EU: A Goal-Based Methodologycomplying with regulatory requirements and maintaining an high level of interoperability among heterogeneous components. In this paper, we provide a goal-based methodology to ensure the fulfillment of the relevant security goals at design time. The methodology enables system architects to devise an

避开 发表于 2025-3-27 01:24:29

http://reply.papertrans.cn/27/2658/265707/265707_32.png

labile 发表于 2025-3-27 06:48:01

http://reply.papertrans.cn/27/2658/265707/265707_33.png

Condyle 发表于 2025-3-27 09:43:40

http://reply.papertrans.cn/27/2658/265707/265707_34.png

intrigue 发表于 2025-3-27 14:21:26

https://doi.org/10.1007/978-1-4684-3572-6form verification and validation of production site by incorporating safety requirements in them. Finally, to manage risks in a dynamic manner, the operational data is gathered, deviations from specified behaviours are tracked, possible implications of control actions are evaluated and necessary ada

分发 发表于 2025-3-27 19:08:02

http://reply.papertrans.cn/27/2658/265707/265707_36.png

百灵鸟 发表于 2025-3-27 21:55:43

Building the Model and Reportingetting for strong consistency depends on the ratio of read and write operations. Finally, we generalize our experience by proposing a benchmarking-based methodology for run-time optimization of consistency settings to achieve the maximum Cassandra performance and still guarantee the strong data cons

FLIC 发表于 2025-3-28 05:42:24

Building the Model and Reportingbabilistic Timing Analysis (MBPTA) aims at estimating the Worst-Case Execution Time (WCET) based on measurements. A technique in the MBPTA “toolbox”, Extreme Value Analysis (EVA) is a statistical paradigm dealing with approximating the properties of extremely deviant values..This paper demonstrates

obscurity 发表于 2025-3-28 08:19:00

Enforcing Geofences for Managing Automated Transportation Risks in Production Sitesform verification and validation of production site by incorporating safety requirements in them. Finally, to manage risks in a dynamic manner, the operational data is gathered, deviations from specified behaviours are tracked, possible implications of control actions are evaluated and necessary ada

incite 发表于 2025-3-28 13:16:14

http://reply.papertrans.cn/27/2658/265707/265707_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Dependable Computing - EDCC 2020 Workshops; AI4RAILS, DREAMS, DS Simona Bernardi,Valeria Vittorini,Paolo Masci Conference proceedings 2020