LEADER 01109nam a2200301 i 4500 001 991001670869707536 005 20020502195014.0 008 970911s1997 it ||| | ita 020 $a8806143603 035 $ab10888640-39ule_inst 035 $aLE02374198$9ExL 040 $aDip.to Studi Storici$bita 082 04$a335.4092 100 1 $aGramsci, Antonio$0118233 245 10$aLettere, 1926-1935 /$cAntonio Gramsci, Tatiana Schucht ; a cura di Aldo Natoli e Chiara Daniele 260 $aTorino :$bG. Einaudi,$c[1997] 300 $aCV, 1532 p. ;$c18 cm. 490 0 $aNuova universale Einaudi ;$v224 500 $aSegue: Appendici. 700 1 $aSchucht, Tatiana$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0221963 700 1 $aNatoli, Aldo 700 1 $aDaniele, Chiara 907 $a.b10888640$b23-02-17$c28-06-02 912 $a991001670869707536 945 $aLE023 335.409 GRA 1 1$g1$i2023000037669$lle023$o-$pE0.00$q-$rn$so $t0$u2$v0$w2$x0$y.i10995614$z28-06-02 996 $aLettere, 1926-1935$91234425 997 $aUNISALENTO 998 $ale023$b01-01-97$cm$da $e-$fita$git $h0$i1 LEADER 06877nam 22008535 450 001 9910744507403321 005 20251113174101.0 010 $a9783031409530 010 $a3031409531 024 7 $a10.1007/978-3-031-40953-0 035 $a(MiAaPQ)EBC30742260 035 $a(Au-PeEL)EBL30742260 035 $a(OCoLC)1397572395 035 $a(DE-He213)978-3-031-40953-0 035 $a(PPN)272734039 035 $a(CKB)28223159500041 035 $a(EXLCZ)9928223159500041 100 $a20230913d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Safety, Reliability, and Security. SAFECOMP 2023 Workshops $eASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Toulouse, France, September 19, 2023, Proceedings /$fedited by Jérémie Guiochet, Stefano Tonetta, Erwin Schoitsch, Matthieu Roy, Friedemann Bitsch 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (448 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14182 311 08$aPrint version: Guiochet, Jérémie Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops Cham : Springer,c2023 9783031409523 327 $aUsing Assurance Cases to Prevent Malicious Behaviour from Targeting Safety Vulnerabilities -- Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy.-Assurance Cases for Timing Properties of Automotive TSN Networks -- Toward Dependability Assurance Framework for Automated Driving Systems -- A Quantitative Approach for System of Systems? Resilience Analyzing Based on Archimate -- Towards DO-178C Compliance of a Secure Product -- The Need for Threat Modelling in Unmanned Aerial Systems -- Using Runtime information of controllers for safe adaptation at runtime: a Process Mining approach -- Safety and Robustness for Deep Neural Networks: An Automotive Use Case -- Towards Dependable Integration Concepts for AI-based Systems -- A Methodology for the Qualification of Operating Systems and Hypervisors for the deployment in IoT devices -- Computer-Aided Generation of Assurance Cases -- RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence -- Patterns for Integrating NIST 800-53 Controls into Security Assurance Cases -- Analyzing Origins of Safety and Security Interactions using Feared Events Trees and Multi-level Model -- Utilising Redundancy to Enhance Security of Safety-Critical Systems -- Reliability Evaluation of Autonomous Transportation System Architecture Based on Markov Chain -- Uncertainty Quantification for Semantic Segmentation Models via Evidential Reasoning -- Research on the Reliability of High-Speed Railway Dispatching and Commanding Personnel with Multi Physiological Signals -- Research on Brain Load prediction based on machine learning for High-speed Railway -- Paired Safety Rule Structure for Human-machine Cooperation with Feature Update and Evolution -- Towards an Effective Generation of Functional Scenarios for AVs to Guide Sampling -- Rear-end Collision Risk Analysis for Autonomous Driving -- Improving road traffic safety and performance ? barriers and directions towards cooperative automated vehicles -- A Group-Level Learning Approach Using Logistic Regression for Fairer Decisions -- Conformal Prediction and Uncertainty Wrapper: What Statistical Guarantees Can You Get for Uncertainty Quantification in Machine Learning -- AIMOS: Metamorphic Testing of AI - An Industrial Application -- AERoS: Assurance of Emergent Behaviour in Autonomous Robotic Swarms -- A Reasonable Driver Standard for Automated Vehicle Safety -- Structuring Research Related to Dynamic Risk Management for Autonomous Systems -- Towards Safe Machine Learning Lifecycles with ESG Model Cards -- Towards Deep Anomaly Detection with Structured Knowledge Representations -- Evaluating and Increasing Segmentation Robustness in CARLA -- Safety Integrity Levels for Artificial Intelligence -- Can Large Language Models assist in Hazard Analysis -- Contextualised Out-of-Distribution Detection using Pattern Identification. . 330 $aThis book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2023, held in Toulouse, France, during September 19, 2023. The 35 full papers included in this volume were carefully reviewed and selected from 49 submissions. - 8th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2023) - 18th International Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems (DECSoS 2023) - 10th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2023) - Second International Workshop on Security and Safety Interactions (SENSEI 2023) - First International Workshop on Safety/ Reliability/ Trustworthiness of Intelligent Transportation Systems (SRToITS 2023) - 6th International Workshop on Artificial Intelligence Safety Engineering (WAISE 2023) . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14182 606 $aComputer engineering 606 $aComputer networks 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aApplication software 606 $aSoftware engineering 606 $aComputer science 606 $aData protection 606 $aComputer Engineering and Networks 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aComputer and Information Systems Applications 606 $aSoftware Engineering 606 $aTheory of Computation 606 $aSecurity Services 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aComputer science. 615 0$aData protection. 615 14$aComputer Engineering and Networks. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aComputer and Information Systems Applications. 615 24$aSoftware Engineering. 615 24$aTheory of Computation. 615 24$aSecurity Services. 676 $a621.39 676 $a004.6 700 $aGuiochet$b Je?re?mie$00 701 $aTonetta$b Stefano$01427977 701 $aSchoitsch$b Erwin$01429222 701 $aRoy$b Matthieu$01429223 701 $aBitsch$b Friedemann$01427978 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910744507403321 996 $aComputer Safety, Reliability, and Security. SAFECOMP 2023 Workshops$93567868 997 $aUNINA