default search action
35th SAFECOMP 2016: Trondheim, Norway
- Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch:
Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings. Lecture Notes in Computer Science 9922, Springer 2016, ISBN 978-3-319-45476-4
Fault Injection
- Louis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Le, Aude Crohen, Philippe de Choudens:
FISSC: A Fault Injection and Simulation Secure Collection. 3-11 - Maryam Raiyat Aliabadi, Karthik Pattabiraman:
FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools. 12-23
Safety Assurance
- Richard Hawkins, Thomas Richardson, Tim Kelly:
Using Process Models in System Assurance. 27-38 - John C. Knight, Jonathan C. Rowanhill:
The Indispensable Role of Rationale in Safety Standards. 39-50 - Ewen Denney, Ganesh J. Pai:
Composition of Safety Argument Patterns. 51-63
Formal Verification
- Maxime Puys, Marie-Laure Potet, Pascal Lafourcade:
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. 67-75 - Quentin Cappart, Pierre Schaus:
A Dedicated Algorithm for Verification of Interlocking Systems. 76-87 - Victor Bos, Harold Bruintjes, Stefano Tonetta:
Catalogue of System and Software Properties. 88-101 - David S. Hardin, Konrad Slind, Mark Bortz, James Potts, Scott Owens:
A High-Assurance, High-Performance Hardware-Based Cross-Domain System. 102-113
Automotive
- Archana Mallya, Vera Pantelic, Morayo Adedjouma, Mark Lawford, Alan Wassyng:
Using STPA in an ISO 26262 Compliant Process. 117-129 - Georg Macher, Eric Armengaud, Eugen Brenner, Christian Kreiner:
A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context. 130-141
Anomaly Detection and Resilience
- Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli:
Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures. 145-158 - William Excoffon, Jean-Charles Fabre, Michaël Lauer:
Towards Modelling Adaptive Fault Tolerance for Resilient Computing Analysis. 159-171 - Leonardo Aniello, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Leonardo Querzoni, Stefano Russo:
Automatic Invariant Selection for Online Anomaly Detection. 172-183
Cyber Security
- Andrew Fielder, Tingting Li, Chris Hankin:
Modelling Cost-Effectiveness of Defenses in Industrial Control Systems. 187-200 - Robert Clausing, Robert Fischer, Jana Dittmann, Yongjian Ding:
Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling. 201-212 - Elena Troubitsyna, Linas Laibinis, Inna Pereverzeva, Tuomas Kuismin, Dubravka Ilic, Timo Latvala:
Towards Security-Explicit Formal Modelling of Safety-Critical Systems. 213-225 - Marcelo Zanetti, Edgard Jamhour, Marcelo Eduardo Pellenz, Manoel Camillo Penna:
A New SVM-Based Fraud Detection Model for AMI. 226-237 - Christopher Jämthagen, Patrik Lantz, Martin Hell:
Exploiting Trust in Deterministic Builds. 238-249
Fault Trees
- Matthias Volk, Sebastian Junges, Joost-Pieter Katoen:
Advancing Dynamic Fault Tree Analysis - Get Succinct State Spaces Fast and Synthesise Failure Rates. 253-265 - Ola Bäckström, Yuliya Butkova, Holger Hermanns, Jan Krcál, Pavel Krcál:
Effective Static and Dynamic Fault Tree Analysis. 266-280
Safety Analysis
- Mehrnoosh Askarpour, Dino Mandrioli, Matteo Rossi, Federico Vicentini:
SAFER-HRC: Safety Analysis Through Formal vERification in Human-Robot Collaboration. 283-295 - Nuno Silva, Marco Vieira:
Adapting the Orthogonal Defect Classification Taxonomy to the Space Domain. 296-308 - Sami Alajrami, Barbara Gallina, Irfan Sljivo, Alexander B. Romanovsky, Petter Isberg:
Towards Cloud-Based Enactment of Safety-Related Processes. 309-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.