LEADER 08113nam 22007935 450 001 996673179203316 005 20250821124903.0 010 $a3-032-02018-2 024 7 $a10.1007/978-3-032-02018-5 035 $a(CKB)40402070900041 035 $a(MiAaPQ)EBC32269960 035 $a(Au-PeEL)EBL32269960 035 $a(DE-He213)978-3-032-02018-5 035 $a(OCoLC)1534810352 035 $a(EXLCZ)9940402070900041 100 $a20250821d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Safety, Reliability, and Security. SAFECOMP 2025 Workshops $eCoC3CPS, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Stockholm, Sweden, September 9, 2025, Proceedings /$fedited by Martin Törngren, Barbara Gallina, Erwin Schoitsch, Elena Troubitsyna, Friedemann Bitsch 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (808 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15955 311 08$a3-032-02017-4 327 $a -- 1st International Workshop on Co-Design of Communication, Computing, and Control in Cyber-Physical Systems (CoC3CPS 2025). -- An end-to-end testbed for communication, compute, and control co-design: the Kista Innovation Park. -- Real-Time Control Selection over the Computing Continuum. -- Temporal Intent-Aware Multi-Agent Learning for Network Optimization. -- 20th International Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2025). -- Dependable AI Inference - A work-in-progress on CPU, Co-Processor and FPGA Approaches. -- Methodology for Test Case Allocation based on a Formalized ODD. -- Safety-Aware Strategy Synthesis for Autonomous System of Systems with UPPAAL. -- From Bouncing Break-ins to Frictional Firewalls: Interacting Requirements for Vehicle Safety and Security. -- A ThreatGet-Based Framework for Aligning System Security with the Cyber Resilience Act. -- i7Fuzzer: Neural-Guided Fuzzing for Enhancing Security Testing of Stateful Protocols. -- HyLLM-IDS: A Conceptual Hybrid LLM-Assisted Intrusion Detection Framework for Cyber-Physical Systems. -- PROTECTION: Provably Robust Intrusion Detection system for IoT through recursive Delegation. -- Towards Credible Simulators: A Validation Methodology for Safety-Critical Virtual Testing. -- Cybersecurity in Partitioned Space Embedded Systems. -- 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2025). -- A GSN-Based Requirement Analysis of the EU AI Regulation. -- A Safety Argument Fragment Towards Safe Deployment of Performant Automated Driving Systems. -- Certus: A domain specific language for confidence assessment in assurance cases. -- Doubt in Safety Claims is Inevitable: What is its Impact, and How to Deal with it?. -- Ensuring Information Security in Inclusive Digital Environments. -- Functional Safety with Model-Based Safety Analysis: A Perspective from ARP4761A. -- High-Performance AI Inference for Agile Deployment on Space-Qualified Processors: A Performance Benchmarking Study. -- SCALOFT: An Initial Approach for Situation Coverage-Based Safety Analysis of an Autonomous Aerial Drone in a Mine. -- 4th International Workshop on Safety-Security Interaction (SENSEI 2025). -- Trick or Treat: A Study of Human Detection of Manipulative Tactics in Phishing Emails. -- Rational Verification in Repeated Security Games. -- Quantitative Assessment of Energy Efficiency, Comfort, and Safety in an Intelligent Heating System Under False Data. -- Cyber-Safety Assessment of Wind Turbines: A Reachability Analysis Approach Against Cyber-Attacks. -- 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems (SRToITS 2025). -- Scenario Hazard Prevention for Autonomous Driving Based on Improved STPA. -- Alexandru Forrai. Systematic test scenario generation and risk assessment for automated driving system. -- AV-SLAF: A Scenario-Layered Framework for Safety Analysis of Autonomous Vehicles Based on STPA and CTA. -- Applying Machine Learning towards the Recognition of Driving Behavior. -- External Human-Machine Interaction Design Principles and Supporting Technologies for Autonomous Vehicles. -- Formal Analysis of Resilience in Transport Systems with Bigraphs. -- Vehicle-Level Safety Validation of AD/ADAS Systems via Extreme Value Analysis. -- 8th International Workshop on Artificial Intelligence Safety Engineering (WAISE 2025). -- A Modular AI Testing Framework for Trustworthy AI: Proof-of-Concept Implementation. -- Architectural Mitigation of Control AI Risk Factors for Safe Human-Robot-Collaboration. -- Uncovering Unsafe Feature Interactions in Vehicle Control Using Generative AI and Digital Twins. -- AURORA Networks: Auto-associative Universal Real-time Outlier Risk Assessment Networks. -- Does not impute! Performance and ethical implications of missing data for an AI-based diabetes co-morbidity predictor. -- Facilitating Fault Tree Analysis with Generative AI. -- Efficient Safety Retrofitting Against Jailbreaking for LLMs. -- Risk Analysis of One-Pixel Image Defects in Safety-Critical Deep Neural Networks. -- Safe Adversarial Control Through Interaction. 330 $aThis book constitutes the proceedings of the Workshops held in conjunction with the 44th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2025, which took place in Stockholm, Sweden, during September 2025. The 43 papers included in this book were carefully reviewed and selected from a total of 61 submissions to the following six workshops: ˇ CoC3CPS 2025, Co-Design of Communication, Computing and Control in Cyber-Physical Systems ˇ DECSoS 2025 ? 20th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems ˇ SASSUR 2025 - 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems ˇ SENSEI 2025 ? 4th International Workshop on Safety and Security Interaction ˇ SRToITS 2025 ? 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems ˇ WAISE 2025 ? 8th International Workshop on Artificial Intelligence Safety Engineering. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15955 606 $aComputer networks 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aInformation technology$xManagement 606 $aSoftware engineering 606 $aComputer science 606 $aData protection 606 $aComputer Communication Networks 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aComputer Application in Administrative Data Processing 606 $aSoftware Engineering 606 $aTheory of Computation 606 $aSecurity Services 615 0$aComputer networks. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aInformation technology$xManagement. 615 0$aSoftware engineering. 615 0$aComputer science. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aComputer Application in Administrative Data Processing. 615 24$aSoftware Engineering. 615 24$aTheory of Computation. 615 24$aSecurity Services. 676 $a004.6 700 $aTo?rngren$b Martin$01328682 701 $aGallina$b Barbara$01768500 701 $aSchoitsch$b Erwin$01429222 701 $aTroubitsyna$b Elena$01845113 701 $aBitsch$b Friedemann$01427978 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996673179203316 996 $aComputer Safety, Reliability, and Security. SAFECOMP 2025 Workshops$94428595 997 $aUNISA