|
|
|
|
LEADER |
03057nam a22006015i 4500 |
001 |
978-3-319-10506-2 |
003 |
DE-He213 |
005 |
20151116135822.0 |
007 |
cr nn 008mamaa |
008 |
140903s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319105062
|9 978-3-319-10506-2
|
024 |
7 |
|
|a 10.1007/978-3-319-10506-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.L63
|
050 |
|
4 |
|a QA76.5913
|
050 |
|
4 |
|a QA76.63
|
072 |
|
7 |
|a UM
|2 bicssc
|
072 |
|
7 |
|a UYF
|2 bicssc
|
072 |
|
7 |
|a COM051000
|2 bisacsh
|
072 |
|
7 |
|a COM036000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.1015113
|2 23
|
245 |
1 |
0 |
|a Computer Safety, Reliability, and Security
|h [electronic resource] :
|b 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings /
|c edited by Andrea Bondavalli, Felicita Di Giandomenico.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XXIV, 356 p. 131 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8666
|
505 |
0 |
|
|a Verification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 33nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2014, held in Florence, Italy, in September 2014. The 20 revised full papers presented together with 3 practical experience reports were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on fault injection techniques, verification and validation techniques, automotive systems, coverage models and mitigation techniques, assurance cases and arguments, system analysis, security and trust, notations/languages for safety related aspects, safety and security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer logic.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Applications.
|
700 |
1 |
|
|a Bondavalli, Andrea.
|e editor.
|
700 |
1 |
|
|a Di Giandomenico, Felicita.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319105055
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8666
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-10506-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|