000 | 03058nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-319-10506-2 | ||
003 | DE-He213 | ||
005 | 20200421111848.0 | ||
007 | cr nn 008mamaa | ||
008 | 140903s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319105062 _9978-3-319-10506-2 |
||
024 | 7 |
_a10.1007/978-3-319-10506-2 _2doi |
|
050 | 4 | _aQA76.9.L63 | |
050 | 4 | _aQA76.5913 | |
050 | 4 | _aQA76.63 | |
072 | 7 |
_aUM _2bicssc |
|
072 | 7 |
_aUYF _2bicssc |
|
072 | 7 |
_aCOM051000 _2bisacsh |
|
072 | 7 |
_aCOM036000 _2bisacsh |
|
082 | 0 | 4 |
_a005.1015113 _223 |
245 | 1 | 0 |
_aComputer Safety, Reliability, and Security _h[electronic resource] : _b33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings / _cedited by Andrea Bondavalli, Felicita Di Giandomenico. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXXIV, 356 p. 131 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8666 |
|
505 | 0 | _aVerification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security. | |
520 | _aThis book constitutes the refereed proceedings of the 33nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2014, held in Florence, Italy, in September 2014. The 20 revised full papers presented together with 3 practical experience reports were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on fault injection techniques, verification and validation techniques, automotive systems, coverage models and mitigation techniques, assurance cases and arguments, system analysis, security and trust, notations/languages for safety related aspects, safety and security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer organization. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer logic. | |
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aLogics and Meanings of Programs. |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Applications. |
700 | 1 |
_aBondavalli, Andrea. _eeditor. |
|
700 | 1 |
_aDi Giandomenico, Felicita. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319105055 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8666 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-10506-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c55937 _d55937 |