000 06826nam a22007095i 4500
001 978-3-031-40953-0
003 DE-He213
005 20240730200630.0
007 cr nn 008mamaa
008 230913s2023 sz | s |||| 0|eng d
020 _a9783031409530
_9978-3-031-40953-0
024 7 _a10.1007/978-3-031-40953-0
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
245 1 0 _aComputer Safety, Reliability, and Security. SAFECOMP 2023 Workshops
_h[electronic resource] :
_bASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Toulouse, France, September 19, 2023, Proceedings /
_cedited by Jérémie Guiochet, Stefano Tonetta, Erwin Schoitsch, Matthieu Roy, Friedemann Bitsch.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXVI, 438 p. 181 illus., 118 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14182
505 0 _aUsing Assurance Cases to Prevent Malicious Behaviour from Targeting Safety Vulnerabilities -- Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy.-Assurance Cases for Timing Properties of Automotive TSN Networks -- Toward Dependability Assurance Framework for Automated Driving Systems -- A Quantitative Approach for System of Systems' Resilience Analyzing Based on Archimate -- Towards DO-178C Compliance of a Secure Product -- The Need for Threat Modelling in Unmanned Aerial Systems -- Using Runtime information of controllers for safe adaptation at runtime: a Process Mining approach -- Safety and Robustness for Deep Neural Networks: An Automotive Use Case -- Towards Dependable Integration Concepts for AI-based Systems -- A Methodology for the Qualification of Operating Systems and Hypervisors for the deployment in IoT devices -- Computer-Aided Generation of Assurance Cases -- RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence -- Patterns for Integrating NIST 800-53 Controls into Security Assurance Cases -- Analyzing Origins of Safety and Security Interactions using Feared Events Trees and Multi-level Model -- Utilising Redundancy to Enhance Security of Safety-Critical Systems -- Reliability Evaluation of Autonomous Transportation System Architecture Based on Markov Chain -- Uncertainty Quantification for Semantic Segmentation Models via Evidential Reasoning -- Research on the Reliability of High-Speed Railway Dispatching and Commanding Personnel with Multi Physiological Signals -- Research on Brain Load prediction based on machine learning for High-speed Railway -- Paired Safety Rule Structure for Human-machine Cooperation with Feature Update and Evolution -- Towards an Effective Generation of Functional Scenarios for AVs to Guide Sampling -- Rear-end Collision Risk Analysis for Autonomous Driving -- Improving road traffic safety and performance - barriers and directions towards cooperative automated vehicles -- A Group-Level Learning Approach Using Logistic Regression for Fairer Decisions -- Conformal Prediction and Uncertainty Wrapper: What Statistical Guarantees Can You Get for Uncertainty Quantification in Machine Learning -- AIMOS: Metamorphic Testing of AI - An Industrial Application -- AERoS: Assurance of Emergent Behaviour in Autonomous Robotic Swarms -- A Reasonable Driver Standard for Automated Vehicle Safety -- Structuring Research Related to Dynamic Risk Management for Autonomous Systems -- Towards Safe Machine Learning Lifecycles with ESG Model Cards -- Towards Deep Anomaly Detection with Structured Knowledge Representations -- Evaluating and Increasing Segmentation Robustness in CARLA -- Safety Integrity Levels for Artificial Intelligence -- Can Large Language Models assist in Hazard Analysis -- Contextualised Out-of-Distribution Detection using Pattern Identification. .
520 _aThis book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2023, held in Toulouse, France, during September 19, 2023. The 35 full papers included in this volume were carefully reviewed and selected from 49 submissions. - 8th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2023) - 18th International Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems (DECSoS 2023) - 10th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2023) - Second International Workshop on Security and Safety Interactions (SENSEI 2023) - First International Workshop on Safety/ Reliability/ Trustworthiness of Intelligent Transportation Systems (SRToITS 2023) - 6th International Workshop on Artificial Intelligence Safety Engineering (WAISE 2023) .
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aComputer vision.
_9164178
650 0 _aApplication software.
_9164179
650 0 _aSoftware engineering.
_94138
650 0 _aComputer science.
_99832
650 0 _aData protection.
_97245
650 1 4 _aComputer Engineering and Networks.
_9164180
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
650 2 4 _aComputer and Information Systems Applications.
_9164181
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aTheory of Computation.
_9164182
650 2 4 _aSecurity Services.
_978910
700 1 _aGuiochet, Jérémie.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9164183
700 1 _aTonetta, Stefano.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9164184
700 1 _aSchoitsch, Erwin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9164185
700 1 _aRoy, Matthieu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9164186
700 1 _aBitsch, Friedemann.
_eeditor.
_0(orcid)
_10000-0001-6152-4121
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9164187
710 2 _aSpringerLink (Online service)
_9164188
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031409523
776 0 8 _iPrinted edition:
_z9783031409547
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14182
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-40953-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96151
_d96151