000 06977nam a22007095i 4500
001 978-3-030-26250-1
003 DE-He213
005 20240730170809.0
007 cr nn 008mamaa
008 190808s2019 sz | s |||| 0|eng d
020 _a9783030262501
_9978-3-030-26250-1
024 7 _a10.1007/978-3-030-26250-1
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
245 1 0 _aComputer Safety, Reliability, and Security
_h[electronic resource] :
_bSAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings /
_cedited by Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, Friedemann Bitsch.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXVI, 412 p. 163 illus., 90 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v11699
505 0 _a7th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2019) -- Combining GSN and STPA for safety arguments -- A modelling approach for system life cycles assurance -- Contract-based Modular Safety Cases for Incremental Certification of Product Lines -- 14th International ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2019) -- Comparative Evaluation of Security Fuzzing Approaches -- Assuring compliance with protection profiles with Threatget -- A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Systems -- Combined Approach for Safety and Security -- Towards Integrated Quantitative Security and Safety Risk Assessment -- Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applications -- Increasing Safety of Neural Networks in Medical Devices -- Smart Wristband for Voting -- 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR 2019) -- Automotive Cybersecurity standards - relation and overview -- A Runtime Safety Monitoring Approach for Adaptable Autonomous Systems -- Structured Reasoning for Socio-Technical Factors of Safety-Security Assurance -- The SISTER approach for Verification and Validation: a lightweight process for reusable results -- Introduction to the Safecomp 2018 Workshop on Safety, securiTy, and pRivacy In automotiVe systEms (STRIVE 2018) -- Demo: CANDY CREAM -- CarINA - Car sharing with IdeNtity based Access control re-enforced by TPM -- Combining Safety and Security in Autonomous Cars Using Blockchain Technologies -- Enhancing CAN security by means of lightweight stream-ciphers and protocols -- Analysis of Security Overhead in Broadcast V2V Communications -- You overtrust your printer -- 2nd International Workshop on Artificial Intelligence Safety Engineering (WAISE 2018) -- Three Reasons Why: Framing the Challenges of Assuring AI -- Improving ML Safety with Partial Specifications -- An Abstraction-Refinement Approach to Formal Verification of Tree Ensembles -- RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies -- A Safety Standard Approach for Fully Autonomous Vehicles (Position Paper) -- Open Questions in Testing of Learned Computer Vision Functions for Automated Driving -- Adaptive Deployment of Safety Monitors for Autonomous Systems -- Uncertainty Wrappers for Data-driven Models - Increase the Transparency of AI/ML-based Models through Enrichment with Dependable Situation-aware Uncertainty Estimates -- Confidence Arguments for Evidence of Performance in Machine Learning for Highly Automated Driving Functions -- Bayesian Uncertainty Quantification with Synthetic Data -- A Self-Certifiable Architecture for Critical Systems Powered by Probabilistic Logic Artificial Intelligence -- Tackling Uncertainty in Safety Assurance for Machine Learning: Continuous Argument Engineering with Attributed Tests -- The Moral Machine: Is It Moral.
520 _aThis book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2019, 38th International Conference on Computer Safety, Reliability and Security, in September 2019 in Turku, Finland. The 32 regular papers included in this volume were carefully reviewed and selected from 43 submissions; the book also contains two invited papers. The workshops included in this volume are: ASSURE 2019: 7th International Workshop on Assurance Cases for Software-Intensive Systems DECSoS 2019: 14th ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2019: 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems STRIVE 2019: Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms WAISE 2019: Second International Workshop on Artificial Intelligence Safety Engineering .
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aArtificial intelligence.
_93407
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aSoftware engineering.
_94138
650 0 _aComputer vision.
_995343
650 1 4 _aComputer Engineering and Networks.
_995346
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer Vision.
_995348
700 1 _aRomanovsky, Alexander.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_995349
700 1 _aTroubitsyna, Elena.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_995351
700 1 _aGashi, Ilir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_995352
700 1 _aSchoitsch, Erwin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_995353
700 1 _aBitsch, Friedemann.
_eeditor.
_0(orcid)
_10000-0001-6152-4121
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_995354
710 2 _aSpringerLink (Online service)
_995357
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030262495
776 0 8 _iPrinted edition:
_z9783030262518
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v11699
_995358
856 4 0 _uhttps://doi.org/10.1007/978-3-030-26250-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c87174
_d87174