|
|
|
|
LEADER |
07266nam a2200637 4500 |
001 |
978-3-030-26250-1 |
003 |
DE-He213 |
005 |
20191022073015.0 |
007 |
cr nn 008mamaa |
008 |
190808s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030262501
|9 978-3-030-26250-1
|
024 |
7 |
|
|a 10.1007/978-3-030-26250-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.C643
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UT
|2 bicssc
|
072 |
|
7 |
|a COM043000
|2 bisacsh
|
072 |
|
7 |
|a UT
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Computer Safety, Reliability, and Security
|h [electronic resource] :
|b SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings /
|c edited by Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, Friedemann Bitsch.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XVI, 412 p. 163 illus., 90 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Programming and Software Engineering ;
|v 11699
|
505 |
0 |
|
|a 7th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2019) -- Combining GSN and STPA for safety arguments -- A modelling approach for system life cycles assurance -- Contract-based Modular Safety Cases for Incremental Certification of Product Lines -- 14th International ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2019) -- Comparative Evaluation of Security Fuzzing Approaches -- Assuring compliance with protection profiles with Threatget -- A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Systems -- Combined Approach for Safety and Security -- Towards Integrated Quantitative Security and Safety Risk Assessment -- Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applications -- Increasing Safety of Neural Networks in Medical Devices -- Smart Wristband for Voting -- 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR 2019) -- Automotive Cybersecurity standards - relation and overview -- A Runtime Safety Monitoring Approach for Adaptable Autonomous Systems -- Structured Reasoning for Socio-Technical Factors of Safety-Security Assurance -- The SISTER approach for Verification and Validation: a lightweight process for reusable results -- Introduction to the Safecomp 2018 Workshop on Safety, securiTy, and pRivacy In automotiVe systEms (STRIVE 2018) -- Demo: CANDY CREAM -- CarINA - Car sharing with IdeNtity based Access control re-enforced by TPM -- Combining Safety and Security in Autonomous Cars Using Blockchain Technologies -- Enhancing CAN security by means of lightweight stream-ciphers and protocols -- Analysis of Security Overhead in Broadcast V2V Communications -- You overtrust your printer -- 2nd International Workshop on Artificial Intelligence Safety Engineering (WAISE 2018) -- Three Reasons Why: Framing the Challenges of Assuring AI -- Improving ML Safety with Partial Specifications -- An Abstraction-Refinement Approach to Formal Verification of Tree Ensembles -- RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies -- A Safety Standard Approach for Fully Autonomous Vehicles (Position Paper) -- Open Questions in Testing of Learned Computer Vision Functions for Automated Driving -- Adaptive Deployment of Safety Monitors for Autonomous Systems -- Uncertainty Wrappers for Data-driven Models - Increase the Transparency of AI/ML-based Models through Enrichment with Dependable Situation-aware Uncertainty Estimates -- Confidence Arguments for Evidence of Performance in Machine Learning for Highly Automated Driving Functions -- Bayesian Uncertainty Quantification with Synthetic Data -- A Self-Certifiable Architecture for Critical Systems Powered by Probabilistic Logic Artificial Intelligence -- Tackling Uncertainty in Safety Assurance for Machine Learning: Continuous Argument Engineering with Attributed Tests -- The Moral Machine: Is It Moral.
|
520 |
|
|
|a This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2019, 38th International Conference on Computer Safety, Reliability and Security, in September 2019 in Turku, Finland. The 32 regular papers included in this volume were carefully reviewed and selected from 43 submissions; the book also contains two invited papers. The workshops included in this volume are: ASSURE 2019: 7th International Workshop on Assurance Cases for Software-Intensive Systems DECSoS 2019: 14th ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2019: 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems STRIVE 2019: Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms WAISE 2019: Second International Workshop on Artificial Intelligence Safety Engineering .
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Optical data processing.
|
650 |
1 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
650 |
2 |
4 |
|a Image Processing and Computer Vision.
|0 http://scigraph.springernature.com/things/product-market-codes/I22021
|
700 |
1 |
|
|a Romanovsky, Alexander.
|e editor.
|0 (orcid)0000-0002-4076-3331
|1 https://orcid.org/0000-0002-4076-3331
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Troubitsyna, Elena.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Gashi, Ilir.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schoitsch, Erwin.
|e editor.
|0 (orcid)0000-0002-0335-5443
|1 https://orcid.org/0000-0002-0335-5443
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bitsch, Friedemann.
|e editor.
|0 (orcid)0000-0001-6152-4121
|1 https://orcid.org/0000-0001-6152-4121
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030262495
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030262518
|
830 |
|
0 |
|a Programming and Software Engineering ;
|v 11699
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-26250-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|