找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Safety, Reliability, and Security; 35th International C Amund Skavhaug,Jérémie Guiochet,Friedemann Bitsch Conference proceedings 2

[复制链接]
查看: 46354|回复: 49
发表于 2025-3-21 19:12:51 | 显示全部楼层 |阅读模式
书目名称Computer Safety, Reliability, and Security
副标题35th International C
编辑Amund Skavhaug,Jérémie Guiochet,Friedemann Bitsch
视频videohttp://file.papertrans.cn/234/233720/233720.mp4
概述Includes supplementary material:
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Computer Safety, Reliability, and Security; 35th International C Amund Skavhaug,Jérémie Guiochet,Friedemann Bitsch Conference proceedings 2
描述This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis.
出版日期Conference proceedings 2016
关键词cloud computing; cybersecurity; formal verification; human-robot collaboration; safety analysis; anomaly
版次1
doihttps://doi.org/10.1007/978-3-319-45477-1
isbn_softcover978-3-319-45476-4
isbn_ebook978-3-319-45477-1Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer International Publishing Switzerland 2016
The information of publication is updating

书目名称Computer Safety, Reliability, and Security影响因子(影响力)




书目名称Computer Safety, Reliability, and Security影响因子(影响力)学科排名




书目名称Computer Safety, Reliability, and Security网络公开度




书目名称Computer Safety, Reliability, and Security网络公开度学科排名




书目名称Computer Safety, Reliability, and Security被引频次




书目名称Computer Safety, Reliability, and Security被引频次学科排名




书目名称Computer Safety, Reliability, and Security年度引用




书目名称Computer Safety, Reliability, and Security年度引用学科排名




书目名称Computer Safety, Reliability, and Security读者反馈




书目名称Computer Safety, Reliability, and Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:36:31 | 显示全部楼层
Using Process Models in System Assurance the process justifications required in assurance cases for critical systems. We use an example case study to illustrate an implementation of the approach. We describe the advantages that this approach brings for system assurance and the development of critical systems.
发表于 2025-3-22 00:39:49 | 显示全部楼层
Composition of Safety Argument Patternssatisfies certain desirable properties. Furthermore, we show that it is always possible to construct complex patterns by omposition in this way. We motivate this work with example patterns extracted from real aviation safety cases, and illustrate the application of the theory on the same.
发表于 2025-3-22 04:43:26 | 显示全部楼层
发表于 2025-3-22 11:06:29 | 显示全部楼层
Using STPA in an ISO 26262 Compliant Processl hazard analysis techniques. In this paper, we analyze how STPA can be used in an ISO 26262 compliant process. We also provide an excerpt of our application of STPA on an automotive subsystem as per the concept phase of ISO 26262.
发表于 2025-3-22 13:05:38 | 显示全部楼层
Automatic Invariant Selection for Online Anomaly Detectionse a general and automatic approach for identifying a subset of mined invariants that properly model system runtime behavior with a reduced amount of background noise. This translates into better overall performance (i.e., less false positives).
发表于 2025-3-22 17:36:30 | 显示全部楼层
0302-9743 iability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anom
发表于 2025-3-22 23:05:21 | 显示全部楼层
Linkage Between Stratigraphyand Hydrology,security of one of the most used industrial protocols: OPC-UA. Using ProVerif, a well known cryptographic protocol verification tool, we are able to check secrecy and authentication properties. We find several attacks on the protocols and provide countermeasures.
发表于 2025-3-23 05:19:16 | 显示全部楼层
发表于 2025-3-23 09:11:19 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-26 07:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表