default search action
34th SAFECOMP 2015: Delft, The Netherlands
- Floor Koornneef, Coen van Gulijk:
Computer Safety, Reliability, and Security - 34th International Conference, SAFECOMP 2015 Delft, The Netherlands, September 23-25, 2015. Proceedings. Lecture Notes in Computer Science 9337, Springer 2015, ISBN 978-3-319-24254-5
Invited Talks
- Cor J. Kalkman:
Medical Devices, Electronic Health Records and Assuring Patient Safety: Future Challenges? 3-6 - Eric A. M. Luiijf:
Cyber (In-)security of Industrial Control Systems: A Societal Challenge. 7-15
Flight Systems
- Carolina D. Villela, Humberto Hayashi Sano, Juliana de Melo Bezerra:
Modeling Guidelines and Usage Analysis Towards Applying HiP-HOPS Method to Airborne Electrical Systems. 19-28 - Anton Tarasyuk, Inna Pereverzeva, Elena Troubitsyna, Timo Latvala:
The Formal Derivation of Mode Logic for Autonomous Satellite Flight Formation. 29-43
Automotive Embedded Systems
- Robert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann:
Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions. 47-58 - Ayhan Mehmed, Sasikumar Punnekkat, Wilfried Steiner, Giacomo Spampinato, Martin Lettner:
Improving Dependability of Vision-Based Advanced Driver Assistance Systems Using Navigation Data and Checkpoint Recognition. 59-73 - Thomas Arts, Stefano Tonetta:
Safely Using the AUTOSAR End-to-End Protection Library. 74-89 - Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface. 90-108
Automotive Software
- Stefan Gulan, Jens Harnisch, Sven Johr, Roberto Kretschmer, Stefan Rieger, Rafael Zalman:
Model-Based Analysis for Safety Critical Software. 111-120 - Asim Abdulkhaleq, Stefan Wagner:
Integrated Safety Analysis Using Systems-Theoretic Process Analysis and Software Model Checking. 121-134 - Peter Folkesson, Fatemeh Ayatolahi, Behrooz Sangchoolie, Jonny Vinter, Mafijul Md. Islam, Johan Karlsson:
Back-to-Back Fault Injection Testing in Model-Based Development. 135-148
Error Detection
- Georgios Stefanakis, Vijay Nagarajan, Marcelo Cintra:
Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics. 151-165 - Andrea Ceccarelli, Tommaso Zoppi, Massimiliano Leone Itria, Andrea Bondavalli:
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems. 166-180
Medical Safety Cases
- Alejandra Ruiz, Paulo Barbosa, Yang Medeiros, Huáscar Espinoza:
Safety Case Driven Development for Medical Devices. 183-196 - Anita Finnegan, Fergal McCaffery:
Towards an International Security Case Framework for Networked Medical Devices. 197-209
Medical Systems
- Homa Alemzadeh, Daniel Chen, Andrew Lewis, Zbigniew T. Kalbarczyk, Jaishankar Raman, Nancy Leveson, Ravishankar K. Iyer:
Systems-Theoretic Safety Assessment of Robotic Telesurgical Systems. 213-227 - Andrew L. King, Lu Feng, Sam Procter, Sanjian Chen, Oleg Sokolsky, John Hatcliff, Insup Lee:
Towards Assurance for Plug & Play Medical Systems. 228-242 - Dagmar Rosenbrand, Rob de Weerd, Lex Bothe, Jan Jaap Baalbergen:
Risk Classification of Data Transfer in Medical Systems. 243-251 - Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Vasiliki Sfyrla, Oleg Sokolsky, Insup Lee:
Requirement Engineering for Functional Alarm System for Interoperable Medical Devices. 252-266
Architectures and Testing
- Pablo Oliveira Antonino, Mario Trapp, Paulo Barbosa, Edmar C. Gurjao, Jeferson Rosário:
The Safety Requirements Decomposition Pattern. 269-282 - Kevin Delmas, Rémi Delmas, Claire Pagetti:
Automatic Architecture Hardening Using Safety Patterns. 283-296 - Peter Bishop:
Modeling the Impact of Testing on Diverse Programs. 297-309
Safety Cases
- Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche:
A Model for Safety Case Confidence Assessment. 313-327 - Ewen Denney, Ganesh J. Pai:
Towards a Formal Basis for Modular Safety Cases. 328-343
Security Attacks
- Maria Vasilevskaya, Simin Nadjm-Tehrani:
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design. 347-361 - Rafael Fedler, Sebastian Banescu, Alexander Pretschner:
ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity. 362-371
Cyber Security and Integration
- Chris W. Johnson:
Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications. 375-384 - Peter T. Popov:
Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device. 385-399 - Chris W. Johnson:
Organisational, Political and Technical Barriers to the Integration of Safety and Cyber-Security Incident Reporting Systems. 400-409 - Georg Macher, Andrea Höller, Harald Sporer, Eric Armengaud, Christian Kreiner:
A Comprehensive Safety, Security, and Serviceability Assessment Method. 410-424
Programming and Compiling
- Jörg Brauer, Markus Dahlweid, Tobias Pankrath, Jan Peleska:
Source-Code-to-Object-Code Traceability Analysis for Avionics Software: Don't Trust Your Compiler. 427-440 - Paul Muntean, Vasantha Kommanapalli, Andreas Ibing, Claudia Eckert:
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT. 441-456 - Navid Rajabpour, Yasser Sedaghat:
A Software-Based Error Detection Technique for Monitoring the Program Execution of RTUs in SCADA. 457-470 - Jian Xiang, John C. Knight, Kevin J. Sullivan:
Real-World Types and Their Application. 471-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.