LEADER 13209nam 22008895 450 001 9910886992003321 005 20240909131039.0 010 $a9783031687389 010 $a3031687388 024 7 $a10.1007/978-3-031-68738-9 035 $a(MiAaPQ)EBC31652783 035 $a(Au-PeEL)EBL31652783 035 $a(CKB)34909807300041 035 $a(DE-He213)978-3-031-68738-9 035 $a(OCoLC)1456141527 035 $a(EXLCZ)9934909807300041 100 $a20240909d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Safety, Reliability, and Security. SAFECOMP 2024 Workshops $eDECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings /$fedited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Erwin Schoitsch, Barbara Gallina, Friedemann Bitsch 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (474 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14989 311 08$a9783031687372 311 08$a303168737X 327 $aIntro -- Preface -- Organization -- Contents -- 19th International ERCIM/EWICS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of Systems (DECSoS 2024) -- 19th International Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- International Program Committee 2024 -- A Systems Viewpoint on the Integration of Subsystems Developed with Heterogeneous Safety Standards -- 1 The Need for Integration -- 2 Why Existing Standards Don't Play Nicely Together -- 2.1 How Existing Standards Differ -- 2.2 Current Approaches to Importance Metrics -- 2.3 Summary of Integration Challenges -- 3 Addressing the Integration Issue -- 3.1 Existing Approaches -- 3.2 The IEC 63187 Approach -- 4 Conclusion -- References -- Intelligent Decision-Making in Lane Detection Systems Featuring Dynamic Framework for Autonomous Vehicles -- 1 Introduction -- 2 Background -- 2.1 AI-Based Approaches -- 2.2 Non AI-Based Approaches -- 2.3 Hybrid Approaches -- 3 Proposed Dynamic Framework -- 3.1 Experimental Setup - Vehicle Demonstrator -- 3.2 Conventional Algorithm -- 3.3 PilotNetC Architecture -- 4 Results -- 4.1 Results for Conventional Algorithms -- 4.2 Results for PilotNetC -- 4.3 The Dynamic Framework -- 5 Conclusion -- References -- Security and Safety in Urban Environments: Evaluating Threats and Risks of Autonomous Last-Mile Delivery Robots -- 1 Introduction -- 2 The Last-Mile Robot in Our Case Study -- 3 Case Study Modeling and Analysis -- 3.1 Extended Multi-level Model -- 3.2 Attack Types -- 4 Analysis of Attack Types and Human-Safety Levels -- 5 Ideas for a Theoretical Approach -- 6 Summary and Outlook -- References -- Safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation -- 1 Introduction -- 2 Related Works. 327 $a3 Reference Scenario for Safe Road-Crossing -- 4 Design of the Danger Function -- 5 Dataset Generation -- 5.1 Lab Environment -- 5.2 Data Collection and Preprocessing -- 5.3 Data Elaboration and Sensor Fusion -- 6 Experimental Evaluation -- 7 Threats to Validity -- 8 Conclusions -- References -- Automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety -- 1 Introduction -- 2 Safety-Critical Networked Control Systems -- 3 Security-Explicit SysML Modelling of NCSs -- 3.1 SysML Modeling of NCSs -- 3.2 Modelling Cyberattacks in SysML -- 4 Modelling and Refinement in Event-B -- 5 Generation of Event-B Specification from SysML Model -- 5.1 Architecture of SysMLToEventB -- 5.2 The Tool-Chain -- 5.3 Tool Validation -- 6 Related Work and Conclusions -- References -- Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Physically Unclonable Function -- 3.2 Network Model -- 3.3 Threat Assumptions -- 4 Two-Factor User Authentication Using PUF -- 4.1 Enrollment Phase -- 4.2 Authentication Phase -- 5 Security Analysis -- 5.1 Formal Security Analysis -- 5.2 Informal Analysis -- 6 Experimental Validation and Performance Analysis -- References -- Enhancing Tunnel Safety with Artery V2X Simulation for Real-Time Risk Assessment -- 1 Introduction -- 2 Related Work -- 3 Artery-Based Risk Assessment Framework -- 3.1 Artery Simulation Framework (Upper Part) -- 3.2 Data Manipulation and Risk Assessment (Lower Part) -- 4 Case Study: Simulation-Based Risk Assessment in Zederhaus Tunnel -- 4.1 Breakdown Scenario: Artery and SUMO Model -- 4.2 Breakdown Scenario: Risk Assessment -- 5 Conclusion and Future Work -- References -- Detecting and Mitigating Errors in Neural Networks -- 1 Introduction -- 2 State of the Art. 327 $a2.1 Error Correcting Memory (ECC Memory) -- 2.2 Memory Tagging -- 2.3 Storage Reduction -- 2.4 2-D ECC/2-D Cyclic Redundancy Check (CRC) -- 3 Layer Properties -- 4 The Proposed Framework -- 4.1 Preparation Step -- 4.2 Error Detection Phase -- 4.3 Error Correction Phase -- 5 Practical Examples -- 5.1 Deviation in the Weight -- 5.2 Deviation in the Architecture or the Activation Function -- 6 Conclusion -- References -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- Workshop Committees -- Organization Committee -- Programme Committee -- Additional Reviewers -- Challenges and Limitations of Utilizing Multi-core/Heterogeneous Logic Elements in the Railway Signaling Applications -- 1 Introduction -- 2 Railway Signaling System -- 3 EN 50129:2018: Hardware Requirements and Guidelines to Achieve SIL 4 -- 4 Architecture of State-of-the-Art Object Controller -- 5 Analysis of Using the Latest Logic Elements in Railway Signaling Systems -- 6 Conclusion -- 7 Future Work -- References -- Identifying Difficult Environmental Conditions with Scenario-Based Hazard and Fault Analysis -- 1 Introduction -- 2 Related Work -- 3 Identifying Triggering Conditions with SHFA -- 3.1 Step One: Scenario Modelling -- 3.2 Step Two: Hazardous Maneuver Identification -- 3.3 Step Three: Triggering Condition Identification -- 4 Illustrative Example -- 4.1 Scenario Modelling -- 4.2 Hazardous Maneuver Identification -- 4.3 Triggering Condition Identification -- 5 Result Analysis and Discussion -- 5.1 Triggering Condition Formalization -- 5.2 Findings -- 5.3 Capabilities and Limitations -- 6 Conclusion and Outlook -- References. 327 $aUsing GPT-4 to Generate Failure Logic -- 1 Introduction -- 2 FLAGPT: Developing a Failure Logic Analysis GPT -- 3 Task and System Descriptions -- 4 Results and Working Experience -- 4.1 Tank Overfill Failure Event -- 4.2 Air Bleed Cabin Supply System -- 4.3 Aircraft Wheel Brake and Gas Leak Systems -- 4.4 Alignment and Consistency -- 5 Conclusions -- References -- Towards an Argument Pattern for the Use of Safety Performance Indicators -- 1 Introduction -- 2 Background -- 3 A High-Level Argument Structure for Using SPIs -- 3.1 Systematic Definition of SPIs -- 3.2 Collection and Analysis of SPIs -- 3.3 Response to SPI Violations -- 4 Critical Analysis of the Argument About SPIs -- 5 Meta-SPIs to Validate the Argument About SPIs -- 6 Related Work -- 7 Summary and Future Work -- References -- Enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis -- 1 Introduction -- 2 Methodological Foundations for Continuous Assurance -- 2.1 Composing Assurance Cases with Theories and Defeater Patterns -- 2.2 Assessing Assurance Case for Soundness and Validity -- 3 Tools Support for Continuous Assurance -- 3.1 Property-Driven Semantics with LLM Support and Synthesized Prolog Logic-Based Analysis -- 3.2 Synthesis Assistant for Generating Assurance Cases -- 3.3 Continuous Assurance for CI/CD Software Designs Using ETB -- 4 Conclusion -- References -- Managing Changing Product Liability Obligations Emerging from New Proposed EU Directive -- 1 Introduction -- 1.1 Background -- 1.2 Recent and Ongoing Changes to the Legal Framework -- 1.3 Scope and Structure -- 2 How Automation Impacts Risk and Liability Obligations -- 3 The Socio-technical System Perspective -- 4 Impact of New EU Product Liability Directive -- 4.1 Overview of Changes -- 4.2 Overall Impact on Product Liability Obligations. 327 $a4.3 Impact on Liability Obligations Due to the Presumption of Defectiveness -- 4.4 Impact on Liability Obligations Due to the Presumption of Causality -- 5 Thoughts on Transparent and Efficient Management of Product Liability Obligations -- 5.1 Manufacturers' Defense Strategies -- 5.2 Liability Obligations Expressed in Modular Assurance Cases and Contracts -- 5.3 Integration of Present Assurance Cases Required by Standards -- 5.4 Capture Confidence in the Strength of Defense Through Independent and Continuous Assessments of the Modular Assurance Cases -- 5.5 Using Assurance Cases for Rebutting Other Presumptions in New PLD -- 6 Discussion, Conclusions and Further Work -- References -- Reaching Consensus on System-of-Systems Resilience Assurance: A Case of Mobility as a Service -- 1 Introduction -- 2 Concepts and Related Works -- 2.1 System Theoretic Process Analysis -- 2.2 Consensus Process Model -- 2.3 Mobility as a Service -- 3 Resilience Argumentation -- 3.1 Step 1: Identify Loss Scenarios -- 3.2 Step 2: Identify Resilience Requirement -- 4 Conflict and Consensus -- 4.1 Assumption -- 4.2 Conflict -- 4.3 Consensus Process Model -- 4.4 Example -- 5 Conclusion and Further Work -- References -- A Deductive Approach to Safety Assurance: Formalising Safety Contracts with Subjective Logic -- 1 Introduction -- 2 Background -- 2.1 Safety Assurance -- 2.2 Subjective Logic -- 3 A Formally Grounded Assurance Argument Structure -- 4 Constructing the Argument and Computing Confidence -- 5 Related Work -- 6 Discussion and Conclusions -- References -- A New Approach to Creating Clear Operational Safety Arguments -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Illustrative Examples -- 5 Conclusions and Future Work -- References -- Including Defeaters in Quantitative Confidence Assessments for Assurance Cases -- 1 Introduction. 327 $a2 Adding Defeaters to Confidence Assessment. 330 $aThis book constitutes the proceedings of the Workshops held in conjunction with the 43rd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2024, which took place in Florence, Italy, during September 2024. The 36 papers included in this book were carefully reviewed and selected from a total of 64 submissions to the following workshops: DECSoS 2024 ? 19th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2024 - 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems TOASTS 2024 ? Towards A Safer Systems? Architecture Through Security WAISE 2024 ? 7th International Workshop on Artificial Intelligence Safety Engineering. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14989 606 $aComputer networks 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aInformation technology$xManagement 606 $aSoftware engineering 606 $aComputer science 606 $aData protection 606 $aComputer Communication Networks 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aComputer Application in Administrative Data Processing 606 $aSoftware Engineering 606 $aTheory of Computation 606 $aSecurity Services 615 0$aComputer networks. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aInformation technology$xManagement. 615 0$aSoftware engineering. 615 0$aComputer science. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aComputer Application in Administrative Data Processing. 615 24$aSoftware Engineering. 615 24$aTheory of Computation. 615 24$aSecurity Services. 676 $a004.6 700 $aCeccarelli$b Andrea$01768495 701 $aTrapp$b Mario$01768496 701 $aBondavalli$b Andrea$0742432 701 $aSchoitsch$b Erwin$01429222 701 $aGallina$b Barbara$01768500 701 $aBitsch$b Friedemann$01427978 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910886992003321 996 $aComputer Safety, Reliability, and Security. SAFECOMP 2024 Workshops$94229470 997 $aUNINA LEADER 03342nam 2200637zu 450 001 9910131357703321 005 20210807004922.0 010 $a2-7351-1911-4 024 7 $a10.4000/books.editionsmsh.3898 035 $a(CKB)3710000000497148 035 $a(SSID)ssj0001579566 035 $a(PQKBManifestationID)16254898 035 $a(PQKBTitleCode)TC0001579566 035 $a(PQKBWorkID)12773713 035 $a(PQKB)10659686 035 $a(FrMaCLE)OB-editionsmsh-3898 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/52336 035 $a(PPN)198369964 035 $a(oapen)doab52336 035 $a(EXLCZ)993710000000497148 100 $a20160829d1996 uy 101 0 $afre 135 $auu||||||m|||| 181 $ctxt 182 $cc 183 $acr 200 00$aL'Europe entre cultures et nations : actes du colloque de Tours, décembre 1993 210 $cÉditions de la Maison des sciences de l?homme$d1996 210 31$a[Place of publication not identified]$cEditions de la Maison des sciences de l'homme$d1996 215 $a1 online resource (XI-343 p.) 225 0 $aCollection Ethnologie de la France L'Europe entre cultures et nations 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a2-7351-0719-1 330 $aDe la nation moderne, telle que le siècle des Lumières l'engendre, ont été retenus deux actes fondateurs. Le premier ancre l'appartenance dans des références communes, une tradition reconnue, un patrimoine. Le second écarte plus ou moins de ce partage les non-originaires, voire les citoyens de second rang. Engendrer ses ancêtres et désigner ses étrangers sont les gestes qui inscrivent la nation au coeur de nos sociétés. Pourtant, dans l'Europe du xxe siècle, que de différences dans la mise en oeuvre de cette forme commune. Sous l'universalité du modèle national se dessine, dans la façon de traiter du patrimoine ou de l'étranger, une large diversité d'histoires et de cultures. Aujourd'hui, les bouleversements qui touchent l'Europe ont soudain ravivé un débat dans lequel l'ethnologie se trouve forcément embarquée. Ses mots les plus courants - « culture », « ethnie », « tradition », « patrimoine » - ne sont-ils pas parfois devenus des armes ? Venus de six pays, ethnologues et historiens de la culture ont dressé un bilan, ouvert un dialogue, et tracé les perspectives d'un nouveau chantier de l'ethnologie dont ce livre témoigne. 606 $aEthnicity$zEurope$vCongresses 606 $aNationalism$zEurope$vCongresses 606 $aCultural property$zEurope$vCongresses 606 $aGender & Ethnic Studies$2HILCC 606 $aSocial Sciences$2HILCC 606 $aEthnic & Race Studies$2HILCC 615 0$aEthnicity 615 0$aNationalism 615 0$aCultural property 615 7$aGender & Ethnic Studies 615 7$aSocial Sciences 615 7$aEthnic & Race Studies 700 $aDaniel Fabre$4auth$0221966 702 $aVoisenat$b Claudie 702 $aJulien$b Eva 702 $aFabre$b Daniel 712 02$aFrance Mission du patrimoine ethnologique. 801 0$bPQKB 906 $aBOOK 912 $a9910131357703321 996 $aL'Europe entre cultures et nations : actes du colloque de Tours, décembre 1993$93361021 997 $aUNINA