000 | 05259nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-031-40923-3 | ||
003 | DE-He213 | ||
005 | 20240730200626.0 | ||
007 | cr nn 008mamaa | ||
008 | 230810s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031409233 _9978-3-031-40923-3 |
||
024 | 7 |
_a10.1007/978-3-031-40923-3 _2doi |
|
050 | 4 | _aTK7885-7895 | |
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUK _2bicssc |
|
072 | 7 |
_aCOM067000 _2bisacsh |
|
072 | 7 |
_aUK _2thema |
|
082 | 0 | 4 |
_a621.39 _223 |
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aComputer Safety, Reliability, and Security _h[electronic resource] : _b42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20-22, 2023, Proceedings / _cedited by Jérémie Guiochet, Stefano Tonetta, Friedemann Bitsch. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXVII, 284 p. 113 illus., 82 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14181 |
|
505 | 0 | _aSafety Assurance -- Assurance Case Arguments in the Large - CERN LHC Machine Protection System -- Identifying Run-time Monitoring Requirements for Autonomous Systems through the Analysis of Safety Arguments -- Redesigning Medical Device Assurance: Separating Technological and Clinical Assurance Cases -- Software Testing & Reliability -- A Cognitive Framework for Modeling Coincident Software Faults: An Experimental Study -- A Taxonomy of Software Defect Forms for Certification Tests in Aviation Industry -- Constraint-guided Test Execution Scheduling: An Experience Report at ABB Robotics -- Neural Networks Robustness & Monitoring -- A low-cost strategic monitoring approach for scalable and interpretable error detection in deep neural networks -- Are Transformers More Robust? Towards Exact Robustness Verification for Transformers -- Model-based Security and Threat Analysis -- Model-based Generation of Attack-Fault Trees -- MBTA: A Model-Based Threat Analysis approach for software architectures -- Attribute Repair for Threat Prevention -- Safety of Autonomous Driving -- Probabilistic Spatial Relations for Monitoring Behavior of Road Users -- Concept and metamodel to support cross-domain safety analysis for ODD expansion of autonomous systems -- Security Engineering -- Pattern-Based Information Flow Control for Safety-Critical On-Chip Systems -- From Standard to Practice: Towards ISA/IEC 62443-conform Public Key Infrastructures -- AI Safety -- The Impact of Training Data Shortfalls on Safety of AI-based Clinical Decision Support Systems -- Data-centric Operational Design Domain Characterization for Machine Learning-based Aeronautical Products -- Online Quantization Adaptation for Fault-Tolerant Neural Network Inference -- Neural Networks & Testing -- Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection -- Towards Scenario-based Safety Validation for Autonomous Trains with Deep Generative Models. | |
520 | _aThis book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023. The 20 full papers included in this volume were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Safety assurance; software testing and reliability; neural networks robustness and monitoring; model-based security and threat analysis; safety of autonomous driving; security engineering; AI safety; and neural networks and testing. | ||
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aApplication software. _9164151 |
|
650 | 0 |
_aRobotics. _92393 |
|
650 | 0 |
_aMicroprogramming . _932081 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aComputer Engineering and Networks. _9164152 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9164153 |
650 | 2 | 4 |
_aRobotics. _92393 |
650 | 2 | 4 |
_aControl Structures and Microprogramming. _932083 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aGuiochet, Jérémie. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164154 |
|
700 | 1 |
_aTonetta, Stefano. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164155 |
|
700 | 1 |
_aBitsch, Friedemann. _eeditor. _0(orcid) _10000-0001-6152-4121 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164156 |
|
710 | 2 |
_aSpringerLink (Online service) _9164157 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031409226 |
776 | 0 | 8 |
_iPrinted edition: _z9783031409240 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14181 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-40923-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96148 _d96148 |