top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Certifications of critical systems - the CECRIS experience / / editors : Andrea Bondavalli, Francesco Brancati
Certifications of critical systems - the CECRIS experience / / editors : Andrea Bondavalli, Francesco Brancati
Edizione [1st ed.]
Pubbl/distr/stampa Gistrup, Denmark : , : River Publishers, , [2017]
Descrizione fisica 1 online resource (316 pages) : illustrations, tables
Disciplina 005.8
Collana River Publishers series in information science and technology
Soggetto topico Computer security
Electronic digital computers
Electronic digital computers - Reliability
ISBN 1-00-333748-1
1-003-33748-1
1-000-79546-2
87-93519-55-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910632997103321
Gistrup, Denmark : , : River Publishers, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security : 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18–20, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Friedemann Bitsch
Computer Safety, Reliability, and Security : 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18–20, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Friedemann Bitsch
Autore Ceccarelli Andrea
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (325 pages)
Disciplina 004.6
Altri autori (Persone) TrappMario
BondavalliAndrea
BitschFriedemann
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Software engineering
Information technology - Management
Robotics
Microprogramming
Computer networks - Security measures
Computer Communication Networks
Software Engineering
Computer Application in Administrative Data Processing
Control Structures and Microprogramming
Mobile and Network Security
ISBN 3-031-68606-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Fault Injection and Tolerance -- In-Memory Zero-Space Floating-Point-Based CNN Protection Using Non-significant and Invariant Bits -- 1 Introduction -- 2 Background -- 3 Proposed Methodology -- 3.1 Identification of non-Significant bits -- 3.2 Location of invariant bits -- 4 Case Study: LeNet-5 and GoogLeNet -- 4.1 Locating Non-Significant Bits -- 4.2 Locating Invariant Bits -- 4.3 Proposed Error Correcting Codes -- 4.4 Overhead Estimation of the Proposed ECCs -- 5 Discussion -- 6 Conclusions -- References -- A Failure Model Library for Simulation-Based Validation of Functional Safety -- 1 Introduction -- 2 Related Work -- 3 A Failure Model Library for Simulation-Based FI -- 3.1 Failure Model Collection -- 3.2 Failure Model Semantics -- 4 Case Study -- 5 Limitations -- 6 Conclusion -- References -- Strategic Resilience Evaluation of Neural Networks Within Autonomous Vehicle Software -- 1 Introduction -- 2 Autonomous Driving Frameworks -- 2.1 L4 System: LBC -- 2.2 L2 System: OpenPilot -- 2.3 Driving Simulator: CARLA -- 3 Methodology -- 3.1 Vulnerable Weights: Taylor Guided Fault Injection (TGFI) -- 3.2 Experimental Campaigns -- 4 Resilience Evaluation -- 4.1 Resilience of L4 LBC -- 4.2 Resilience of L2 OpenPilot -- 5 Mitigation -- 5.1 L4 LBC: Ranger -- 5.2 L2 OpenPilot: Driver Intervention -- 6 Case Studies and Discussion -- 6.1 Importance of Layer Depth for Resilience -- 6.2 Sensitivity to Single and Multi-bit Faults -- 6.3 Lessons Learned from L4 LBC and L2 OpenPilot -- 7 Related Work -- 8 Conclusions -- References -- System and Software Safety Assurance -- Reconciling Safety Measurement and Dynamic Assurance -- 1 Introduction -- 2 Conceptual Background -- 3 Motivating Example -- 3.1 Baseline Safety -- 3.2 Practical Drift -- 4 Framework -- 4.1 Defining Safety Metrics and Indicators.
4.2 Updating and Revising the Operational Risk Assessment -- 4.3 Characterizing the Change to Safety Risk -- 4.4 Numerical Examples -- 5 Towards Formal Foundations -- 6 Concluding Remarks -- References -- Safety Invariant Engineering for Interlocking Verification -- 1 Introduction -- 2 Safety Invariants -- 2.1 Requirements -- 2.2 Current Solutions -- 3 Property Engineering -- 3.1 Eliciting Safety Properties from Standards -- 3.2 Reducing the Number of False Positives -- 3.3 Redefining What the Property Violation Is -- 3.4 Regression Testing of Developed Safety Invariants -- 4 Discussion and Conclusions -- References -- Assurance Case Synthesis from a Curated Semantic Triplestore -- 1 Introduction -- 2 The Rapid Assurance Curation Kit (RACK) -- 3 Automated GSN Synthesis from RACK -- 3.1 The GSN Ontology -- 3.2 Project-Specific GSN Pattern Example -- 3.3 Automated Synthesis of GSN Fragments Using Patterns -- 3.4 GUI Support for GSN Generation and Analysis -- 4 Related Work -- 5 Conclusion -- References -- CyberDS: Auditable Monitoring in the Cloud -- 1 Introduction -- 2 Motivating Example -- 3 Monitoring Approach -- 3.1 Specification Language -- 3.2 Security Monitor -- 3.3 Tamper-Proof Claim Database and Auditability -- 4 Claim Revision Control -- 4.1 Revision Model -- 4.2 Monitoring with Revisions -- 5 Implementation and Experimental Results -- 6 Discussion -- 7 Related Work -- 7.1 Runtime Monitoring -- 7.2 Auditability of System Events -- 8 Conclusion -- References -- Automated Driving Systems -- Anatomy of a Robotaxi Crash: Lessons from the Cruise Pedestrian Dragging Mishap -- 1 Introduction -- 2 Background -- 2.1 Terminology -- 2.2 Crash Context and Overview -- 3 Crash Details -- 3.1 Crash Timeline -- 3.2 Crash Analysis -- 3.3 Potential Lessons -- 4 The Immediate Response -- 4.1 Immediate Response Timeline -- 4.2 Post-Crash Analysis.
4.3 Potential Lessons -- 5 Organizational Response -- 5.1 Organizational Response Analysis -- 5.2 Potential Lessons -- 6 Conclusions -- References -- Comprehensive Change Impact Analysis Applied to Advanced Automotive Systems -- 1 Introduction -- 2 Background on CIA for Incremental Safety Assurance -- 3 Running Example -- 4 Original Vehicle Family Models Stage 0 -- 4.1 HARA Metamodels -- 4.2 HAZOP Metamodels -- 4.3 Verification Metamodel -- 4.4 Instance Models -- 4.5 Instances for Stage 0 -- 5 CIA After a Change to the Battery Management System -- 5.1 Identifying Direct Changes - Stage 1 -- 5.2 Identifying Potential Impacts in the System - Stage 2 -- 5.3 Confirming Actual Impacts in the System - Stage 3 -- 5.4 Identifying Potential Impacts in the Assurance Case - Stage 4 -- 5.5 Confirming Actual Impacts in the Assurance - Stage 5 -- 5.6 Incremental Assurance - Stages 6 and 7 -- 6 Discussion -- 7 Conclusion -- References -- A Case Study of Continuous Assurance Argument for Level 4 Automated Driving -- 1 Introduction -- 2 Related Work -- 3 A Case Study in a Local City -- 3.1 Top Level of Assurance Case for Level 4 Automated Driving -- 3.2 GSN Module M2 for Identification of Risk and Hazard -- 3.3 GSN Module M4 for Evaluation and Validation -- 4 A Toolchain of an Assurance Case Tool and a Monitoring System -- 5 Lessons Obtained from the Case Study -- 6 Concluding Remarks -- References -- Security of Safety-Critical Systems -- TitanSSL: Towards Accelerating OpenSSL in a Full RISC-V Architecture Using OpenTitan Root-of-Trust -- 1 Introduction -- 2 Background and Related Works -- 3 Hardware Architecture -- 4 TitanSSL Software Architecture -- 4.1 Application Processor -- 4.2 Security Controller -- 5 Experimental Results -- 5.1 Comparison with Software Implementation -- 5.2 OpenTitan Firmware Analysis -- 6 Security Assumptions and Implications.
7 Conclusion -- References -- A Lightweight and Responsive On-Line IDS Towards Intelligent Connected Vehicles System -- 1 Introduction -- 2 Methodology -- 2.1 System Overview -- 2.2 Threat Model -- 2.3 ML-BF Model -- 2.4 Feature Engineering -- 2.5 Blacklist Filter -- 3 Implementation -- 3.1 Testbed Setting -- 3.2 Dataset Selection -- 3.3 Data Pre-processing -- 3.4 Machine Learning Approaches Adoption -- 3.5 Model Training -- 4 Experimental Results -- 4.1 Evaluation Metrics -- 4.2 Detection Performance -- 4.3 Computational Consumption -- 4.4 Analysis and Discussion -- 5 Related Work -- 5.1 Machine Learning for Intrusion Detection in ICV -- 5.2 Lightweight IDS in ICV -- 5.3 Responsive IDS in ICV -- 6 Conclusion -- References -- Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 Experimental Study Methodology -- 5 Experimental Study Results -- 5.1 RQ1: Contests Versus Vulnerabilities -- 5.2 RQ2: Tools Versus Vulnerabilities -- 5.3 RQ3: Tools in Theory Versus Tools in Practice -- 5.4 RQ4: Analysis Complexity Versus Tool Efficacy -- 6 Conclusions -- References -- Safety-Security Analysis via Attack-Fault-Defense Trees: Semantics and Cut Set Metrics -- 1 Introduction -- 2 Related Work -- 3 Case Study: Gridshield -- 4 Background -- 5 Attack-Fault-Defense Trees -- 5.1 Formal Definition of AFDT -- 5.2 Gridshield AFDT -- 6 Qualitative Analysis of AFDT -- 7 Safety and Security Dependencies via MCS -- 8 Conclusion and Future Work -- References -- Safety Verification -- Coyan: Fault Tree Analysis - Exact and Scalable -- 1 Introduction -- 2 Preliminaries -- 3 Computing Unreliability Values -- 4 Unreliability Through WMC of Tseitin Transformation -- 5 Implementation -- 6 Experimentation -- 6.1 Benchmarks -- 6.2 Results -- 6.3 Industrial Benchmarks -- 7 Concluding Remarks.
References -- Safety Argumentation for Machinery Assembly Control Software -- 1 Introduction -- 2 Background -- 2.1 EN ISO 13849:2023 -- 2.2 Assurance Cases -- 2.3 Contract-Based Design -- 3 SAMACS: Safety Argumentation for Machinery Assembly Control Software -- 4 Case Study -- 4.1 Establishment of Software Responsibility -- 4.2 Definition of Software Safety Goals -- 4.3 Identification of Software Safety Requirements -- 4.4 Definition of Contracts -- 4.5 Identification of Verification Techniques and Evidence Provision -- 4.6 Composing the Safety Case Arguments -- 5 Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Sound Non-interference Analysis for C/C++ -- 1 Introduction -- 2 Sound Static Source Code Analysis -- 3 Data and Control Flow Errors -- 4 Data and Control Flow Analysis -- 5 Taint Analysis -- 5.1 Modeling Interference -- 5.2 Signal Flow Analysis -- 5.3 Freedom of Interference Between Software Components -- 6 Experimental Results -- 7 Related Work -- 8 Conclusion -- References -- Autonomous Systems -- A Dynamic Assurance Framework for an Autonomous Survey Drone -- 1 Introduction -- 2 Related Literature -- 3 Case Study and Monitor Examples -- 3.1 Monitoring Battery State and Required Power Consumption -- 3.2 Monitoring and Predicting Task Scheduling and Executing Times -- 3.3 Reconfigurations Calculation -- 4 Dynamic Assurance Case Approach -- 4.1 Battery Monitor Assurance Case -- 4.2 Discussion -- 4.3 Online Monitoring Interface -- 5 Conclusions -- References -- Redefining Safety for Autonomous Vehicles -- 1 Introduction -- 2 Existing Safety Definitions -- 2.1 ISO 26262 -- 2.2 ISO 21448 -- 2.3 ANSI/UL 4600 -- 2.4 Other Safety Definitions -- 3 Examples of AV Safety Problems -- 4 What is Missing from Safety Definitions -- 4.1 Open World Environment -- 4.2 Self-enforcement of Operational Limitations.
4.3 Ad Hoc Systems of Systems.
Record Nr. UNINA-9910886991403321
Ceccarelli Andrea  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security [[electronic resource] ] : 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings / / edited by Andrea Bondavalli, Felicita Di Giandomenico
Computer Safety, Reliability, and Security [[electronic resource] ] : 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings / / edited by Andrea Bondavalli, Felicita Di Giandomenico
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXIV, 356 p. 131 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer logic
Computer organization
Software engineering
Computer security
Application software
Logics and Meanings of Programs
Computer Systems Organization and Communication Networks
Software Engineering
Systems and Data Security
Computer Applications
ISBN 3-319-10506-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Verification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security.
Record Nr. UNISA-996202526603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security [[electronic resource] ] : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings / / edited by Andrea Bondavalli, Andrea Ceccarelli, Frank Ortmeier
Computer Safety, Reliability, and Security [[electronic resource] ] : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings / / edited by Andrea Bondavalli, Andrea Ceccarelli, Frank Ortmeier
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 456 p. 155 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer logic
Computer organization
Software engineering
Computer security
Logics and Meanings of Programs
Computer Systems Organization and Communication Networks
Software Engineering
Systems and Data Security
ISBN 3-319-10557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Architecting Safety in Collaborative Mobile Systems (ASCoMS'14) -- ERCIM/EWICS/ARTEMIS Workshop on Dependable Embedded and Cyberphysical Systems and Systems-of-Systems (DECSoS’14) -- DEvelopment, Verification and VAlidation of cRiTical Systems  (DEVVARTS'14) -- Integration of Safety and Security Engineering (ISSE'14) -- Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI'14) -- Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR'14).
Record Nr. UNISA-996202530603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security : 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings / / edited by Andrea Bondavalli, Felicita Di Giandomenico
Computer Safety, Reliability, and Security : 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings / / edited by Andrea Bondavalli, Felicita Di Giandomenico
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXIV, 356 p. 131 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer logic
Computer organization
Software engineering
Computer security
Application software
Logics and Meanings of Programs
Computer Systems Organization and Communication Networks
Software Engineering
Systems and Data Security
Computer Applications
ISBN 3-319-10506-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Verification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security.
Record Nr. UNINA-9910484397203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings / / edited by Andrea Bondavalli, Andrea Ceccarelli, Frank Ortmeier
Computer Safety, Reliability, and Security : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings / / edited by Andrea Bondavalli, Andrea Ceccarelli, Frank Ortmeier
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 456 p. 155 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer logic
Computer organization
Software engineering
Computer security
Logics and Meanings of Programs
Computer Systems Organization and Communication Networks
Software Engineering
Systems and Data Security
ISBN 3-319-10557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Architecting Safety in Collaborative Mobile Systems (ASCoMS'14) -- ERCIM/EWICS/ARTEMIS Workshop on Dependable Embedded and Cyberphysical Systems and Systems-of-Systems (DECSoS’14) -- DEvelopment, Verification and VAlidation of cRiTical Systems  (DEVVARTS'14) -- Integration of Safety and Security Engineering (ISSE'14) -- Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI'14) -- Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR'14).
Record Nr. UNINA-9910483100203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops : DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Erwin Schoitsch, Barbara Gallina, Friedemann Bitsch
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops : DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Erwin Schoitsch, Barbara Gallina, Friedemann Bitsch
Autore Ceccarelli Andrea
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (474 pages)
Disciplina 004.6
Altri autori (Persone) TrappMario
BondavalliAndrea
SchoitschErwin
GallinaBarbara
BitschFriedemann
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Image processing - Digital techniques
Computer vision
Information technology - Management
Software engineering
Computer science
Data protection
Computer Communication Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Administrative Data Processing
Software Engineering
Theory of Computation
Security Services
ISBN 3-031-68738-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- 19th International ERCIM/EWICS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of Systems (DECSoS 2024) -- 19th International Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- International Program Committee 2024 -- A Systems Viewpoint on the Integration of Subsystems Developed with Heterogeneous Safety Standards -- 1 The Need for Integration -- 2 Why Existing Standards Don't Play Nicely Together -- 2.1 How Existing Standards Differ -- 2.2 Current Approaches to Importance Metrics -- 2.3 Summary of Integration Challenges -- 3 Addressing the Integration Issue -- 3.1 Existing Approaches -- 3.2 The IEC 63187 Approach -- 4 Conclusion -- References -- Intelligent Decision-Making in Lane Detection Systems Featuring Dynamic Framework for Autonomous Vehicles -- 1 Introduction -- 2 Background -- 2.1 AI-Based Approaches -- 2.2 Non AI-Based Approaches -- 2.3 Hybrid Approaches -- 3 Proposed Dynamic Framework -- 3.1 Experimental Setup - Vehicle Demonstrator -- 3.2 Conventional Algorithm -- 3.3 PilotNetC Architecture -- 4 Results -- 4.1 Results for Conventional Algorithms -- 4.2 Results for PilotNetC -- 4.3 The Dynamic Framework -- 5 Conclusion -- References -- Security and Safety in Urban Environments: Evaluating Threats and Risks of Autonomous Last-Mile Delivery Robots -- 1 Introduction -- 2 The Last-Mile Robot in Our Case Study -- 3 Case Study Modeling and Analysis -- 3.1 Extended Multi-level Model -- 3.2 Attack Types -- 4 Analysis of Attack Types and Human-Safety Levels -- 5 Ideas for a Theoretical Approach -- 6 Summary and Outlook -- References -- Safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation -- 1 Introduction -- 2 Related Works.
3 Reference Scenario for Safe Road-Crossing -- 4 Design of the Danger Function -- 5 Dataset Generation -- 5.1 Lab Environment -- 5.2 Data Collection and Preprocessing -- 5.3 Data Elaboration and Sensor Fusion -- 6 Experimental Evaluation -- 7 Threats to Validity -- 8 Conclusions -- References -- Automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety -- 1 Introduction -- 2 Safety-Critical Networked Control Systems -- 3 Security-Explicit SysML Modelling of NCSs -- 3.1 SysML Modeling of NCSs -- 3.2 Modelling Cyberattacks in SysML -- 4 Modelling and Refinement in Event-B -- 5 Generation of Event-B Specification from SysML Model -- 5.1 Architecture of SysMLToEventB -- 5.2 The Tool-Chain -- 5.3 Tool Validation -- 6 Related Work and Conclusions -- References -- Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Physically Unclonable Function -- 3.2 Network Model -- 3.3 Threat Assumptions -- 4 Two-Factor User Authentication Using PUF -- 4.1 Enrollment Phase -- 4.2 Authentication Phase -- 5 Security Analysis -- 5.1 Formal Security Analysis -- 5.2 Informal Analysis -- 6 Experimental Validation and Performance Analysis -- References -- Enhancing Tunnel Safety with Artery V2X Simulation for Real-Time Risk Assessment -- 1 Introduction -- 2 Related Work -- 3 Artery-Based Risk Assessment Framework -- 3.1 Artery Simulation Framework (Upper Part) -- 3.2 Data Manipulation and Risk Assessment (Lower Part) -- 4 Case Study: Simulation-Based Risk Assessment in Zederhaus Tunnel -- 4.1 Breakdown Scenario: Artery and SUMO Model -- 4.2 Breakdown Scenario: Risk Assessment -- 5 Conclusion and Future Work -- References -- Detecting and Mitigating Errors in Neural Networks -- 1 Introduction -- 2 State of the Art.
2.1 Error Correcting Memory (ECC Memory) -- 2.2 Memory Tagging -- 2.3 Storage Reduction -- 2.4 2-D ECC/2-D Cyclic Redundancy Check (CRC) -- 3 Layer Properties -- 4 The Proposed Framework -- 4.1 Preparation Step -- 4.2 Error Detection Phase -- 4.3 Error Correction Phase -- 5 Practical Examples -- 5.1 Deviation in the Weight -- 5.2 Deviation in the Architecture or the Activation Function -- 6 Conclusion -- References -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- Workshop Committees -- Organization Committee -- Programme Committee -- Additional Reviewers -- Challenges and Limitations of Utilizing Multi-core/Heterogeneous Logic Elements in the Railway Signaling Applications -- 1 Introduction -- 2 Railway Signaling System -- 3 EN 50129:2018: Hardware Requirements and Guidelines to Achieve SIL 4 -- 4 Architecture of State-of-the-Art Object Controller -- 5 Analysis of Using the Latest Logic Elements in Railway Signaling Systems -- 6 Conclusion -- 7 Future Work -- References -- Identifying Difficult Environmental Conditions with Scenario-Based Hazard and Fault Analysis -- 1 Introduction -- 2 Related Work -- 3 Identifying Triggering Conditions with SHFA -- 3.1 Step One: Scenario Modelling -- 3.2 Step Two: Hazardous Maneuver Identification -- 3.3 Step Three: Triggering Condition Identification -- 4 Illustrative Example -- 4.1 Scenario Modelling -- 4.2 Hazardous Maneuver Identification -- 4.3 Triggering Condition Identification -- 5 Result Analysis and Discussion -- 5.1 Triggering Condition Formalization -- 5.2 Findings -- 5.3 Capabilities and Limitations -- 6 Conclusion and Outlook -- References.
Using GPT-4 to Generate Failure Logic -- 1 Introduction -- 2 FLAGPT: Developing a Failure Logic Analysis GPT -- 3 Task and System Descriptions -- 4 Results and Working Experience -- 4.1 Tank Overfill Failure Event -- 4.2 Air Bleed Cabin Supply System -- 4.3 Aircraft Wheel Brake and Gas Leak Systems -- 4.4 Alignment and Consistency -- 5 Conclusions -- References -- Towards an Argument Pattern for the Use of Safety Performance Indicators -- 1 Introduction -- 2 Background -- 3 A High-Level Argument Structure for Using SPIs -- 3.1 Systematic Definition of SPIs -- 3.2 Collection and Analysis of SPIs -- 3.3 Response to SPI Violations -- 4 Critical Analysis of the Argument About SPIs -- 5 Meta-SPIs to Validate the Argument About SPIs -- 6 Related Work -- 7 Summary and Future Work -- References -- Enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis -- 1 Introduction -- 2 Methodological Foundations for Continuous Assurance -- 2.1 Composing Assurance Cases with Theories and Defeater Patterns -- 2.2 Assessing Assurance Case for Soundness and Validity -- 3 Tools Support for Continuous Assurance -- 3.1 Property-Driven Semantics with LLM Support and Synthesized Prolog Logic-Based Analysis -- 3.2 Synthesis Assistant for Generating Assurance Cases -- 3.3 Continuous Assurance for CI/CD Software Designs Using ETB -- 4 Conclusion -- References -- Managing Changing Product Liability Obligations Emerging from New Proposed EU Directive -- 1 Introduction -- 1.1 Background -- 1.2 Recent and Ongoing Changes to the Legal Framework -- 1.3 Scope and Structure -- 2 How Automation Impacts Risk and Liability Obligations -- 3 The Socio-technical System Perspective -- 4 Impact of New EU Product Liability Directive -- 4.1 Overview of Changes -- 4.2 Overall Impact on Product Liability Obligations.
4.3 Impact on Liability Obligations Due to the Presumption of Defectiveness -- 4.4 Impact on Liability Obligations Due to the Presumption of Causality -- 5 Thoughts on Transparent and Efficient Management of Product Liability Obligations -- 5.1 Manufacturers' Defense Strategies -- 5.2 Liability Obligations Expressed in Modular Assurance Cases and Contracts -- 5.3 Integration of Present Assurance Cases Required by Standards -- 5.4 Capture Confidence in the Strength of Defense Through Independent and Continuous Assessments of the Modular Assurance Cases -- 5.5 Using Assurance Cases for Rebutting Other Presumptions in New PLD -- 6 Discussion, Conclusions and Further Work -- References -- Reaching Consensus on System-of-Systems Resilience Assurance: A Case of Mobility as a Service -- 1 Introduction -- 2 Concepts and Related Works -- 2.1 System Theoretic Process Analysis -- 2.2 Consensus Process Model -- 2.3 Mobility as a Service -- 3 Resilience Argumentation -- 3.1 Step 1: Identify Loss Scenarios -- 3.2 Step 2: Identify Resilience Requirement -- 4 Conflict and Consensus -- 4.1 Assumption -- 4.2 Conflict -- 4.3 Consensus Process Model -- 4.4 Example -- 5 Conclusion and Further Work -- References -- A Deductive Approach to Safety Assurance: Formalising Safety Contracts with Subjective Logic -- 1 Introduction -- 2 Background -- 2.1 Safety Assurance -- 2.2 Subjective Logic -- 3 A Formally Grounded Assurance Argument Structure -- 4 Constructing the Argument and Computing Confidence -- 5 Related Work -- 6 Discussion and Conclusions -- References -- A New Approach to Creating Clear Operational Safety Arguments -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Illustrative Examples -- 5 Conclusions and Future Work -- References -- Including Defeaters in Quantitative Confidence Assessments for Assurance Cases -- 1 Introduction.
2 Adding Defeaters to Confidence Assessment.
Record Nr. UNINA-9910886992003321
Ceccarelli Andrea  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-Physical Systems of Systems [[electronic resource] ] : Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy / / edited by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz
Cyber-Physical Systems of Systems [[electronic resource] ] : Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy / / edited by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 257 p. 124 illus.)
Disciplina 004.6
Collana Programming and Software Engineering
Soggetto topico Computer organization
Software engineering
System theory
Application software
Computer Systems Organization and Communication Networks
Software Engineering
Complex Systems
Information Systems Applications (incl. Internet)
Computer Applications
ISBN 3-319-47590-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Basic concepts on systems of systems -- interfaces in evolving cyber-physical systems-of-systems -- emergence in cyber-physical systems-of-systems (CPSOSS) -- AMADEOS sysml profile for SoS conceptual modeling -- AMADEOS framework and supporting tools -- time and resilient master clocks in cyber-physical systems -- managing dynamicity in SoS -- case study definition and implementation.
Record Nr. UNINA-9910166651203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-Physical Systems of Systems [[electronic resource] ] : Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy / / edited by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz
Cyber-Physical Systems of Systems [[electronic resource] ] : Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy / / edited by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 257 p. 124 illus.)
Disciplina 004.6
Collana Programming and Software Engineering
Soggetto topico Computer organization
Software engineering
System theory
Application software
Computer Systems Organization and Communication Networks
Software Engineering
Complex Systems
Information Systems Applications (incl. Internet)
Computer Applications
ISBN 3-319-47590-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Basic concepts on systems of systems -- interfaces in evolving cyber-physical systems-of-systems -- emergence in cyber-physical systems-of-systems (CPSOSS) -- AMADEOS sysml profile for SoS conceptual modeling -- AMADEOS framework and supporting tools -- time and resilient master clocks in cyber-physical systems -- managing dynamicity in SoS -- case study definition and implementation.
Record Nr. UNISA-996465510703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Dependable Computing [[electronic resource] ] : Third Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings / / edited by Andrea Bondavalli, Francisco Brasileiro, Sergio Rajsbaum
Dependable Computing [[electronic resource] ] : Third Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings / / edited by Andrea Bondavalli, Francisco Brasileiro, Sergio Rajsbaum
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIV, 242 p.)
Disciplina 004.2
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computers, Special purpose
Electronic digital computers—Evaluation
Software engineering
Logic design
Coding theory
Information theory
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Software Engineering
Logic Design
Coding and Information Theory
ISBN 3-540-75294-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.
Record Nr. UNISA-996466099503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui