


default search action
34th SAFECOMP 2015: Delft, The Netherlands
- Floor Koornneef, Coen van Gulijk

:
Computer Safety, Reliability, and Security - 34th International Conference, SAFECOMP 2015 Delft, The Netherlands, September 23-25, 2015. Proceedings. Lecture Notes in Computer Science 9337, Springer 2015, ISBN 978-3-319-24254-5
Invited Talks
- Cor J. Kalkman:

Medical Devices, Electronic Health Records and Assuring Patient Safety: Future Challenges? 3-6 - Eric A. M. Luiijf

:
Cyber (In-)security of Industrial Control Systems: A Societal Challenge. 7-15
Flight Systems
- Carolina D. Villela, Humberto Hayashi Sano, Juliana de Melo Bezerra

:
Modeling Guidelines and Usage Analysis Towards Applying HiP-HOPS Method to Airborne Electrical Systems. 19-28 - Anton Tarasyuk, Inna Pereverzeva, Elena Troubitsyna, Timo Latvala:

The Formal Derivation of Mode Logic for Autonomous Satellite Flight Formation. 29-43
Automotive Embedded Systems
- Robert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann:

Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions. 47-58 - Ayhan Mehmed, Sasikumar Punnekkat

, Wilfried Steiner, Giacomo Spampinato, Martin Lettner:
Improving Dependability of Vision-Based Advanced Driver Assistance Systems Using Navigation Data and Checkpoint Recognition. 59-73 - Thomas Arts, Stefano Tonetta:

Safely Using the AUTOSAR End-to-End Protection Library. 74-89 - Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:

A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface. 90-108
Automotive Software
- Stefan Gulan, Jens Harnisch, Sven Johr, Roberto Kretschmer, Stefan Rieger, Rafael Zalman:

Model-Based Analysis for Safety Critical Software. 111-120 - Asim Abdulkhaleq, Stefan Wagner

:
Integrated Safety Analysis Using Systems-Theoretic Process Analysis and Software Model Checking. 121-134 - Peter Folkesson, Fatemeh Ayatolahi, Behrooz Sangchoolie, Jonny Vinter

, Mafijul Md. Islam, Johan Karlsson:
Back-to-Back Fault Injection Testing in Model-Based Development. 135-148
Error Detection
- Georgios Stefanakis, Vijay Nagarajan, Marcelo Cintra:

Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics. 151-165 - Andrea Ceccarelli

, Tommaso Zoppi
, Massimiliano Leone Itria, Andrea Bondavalli
:
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems. 166-180
Medical Safety Cases
- Alejandra Ruiz, Paulo Barbosa, Yang Medeiros, Huáscar Espinoza:

Safety Case Driven Development for Medical Devices. 183-196 - Anita Finnegan, Fergal McCaffery

:
Towards an International Security Case Framework for Networked Medical Devices. 197-209
Medical Systems
- Homa Alemzadeh

, Daniel Chen, Andrew Lewis, Zbigniew T. Kalbarczyk, Jaishankar Raman, Nancy Leveson, Ravishankar K. Iyer:
Systems-Theoretic Safety Assessment of Robotic Telesurgical Systems. 213-227 - Andrew L. King, Lu Feng, Sam Procter

, Sanjian Chen, Oleg Sokolsky
, John Hatcliff, Insup Lee:
Towards Assurance for Plug & Play Medical Systems. 228-242 - Dagmar Rosenbrand, Rob de Weerd, Lex Bothe, Jan Jaap Baalbergen:

Risk Classification of Data Transfer in Medical Systems. 243-251 - Krishna K. Venkatasubramanian, Eugene Y. Vasserman

, Vasiliki Sfyrla, Oleg Sokolsky
, Insup Lee:
Requirement Engineering for Functional Alarm System for Interoperable Medical Devices. 252-266
Architectures and Testing
- Pablo Oliveira Antonino, Mario Trapp, Paulo Barbosa, Edmar C. Gurjao, Jeferson Rosário:

The Safety Requirements Decomposition Pattern. 269-282 - Kevin Delmas, Rémi Delmas, Claire Pagetti:

Automatic Architecture Hardening Using Safety Patterns. 283-296 - Peter Bishop

:
Modeling the Impact of Testing on Diverse Programs. 297-309
Safety Cases
- Jérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche:

A Model for Safety Case Confidence Assessment. 313-327 - Ewen Denney, Ganesh J. Pai:

Towards a Formal Basis for Modular Safety Cases. 328-343
Security Attacks
- Maria Vasilevskaya, Simin Nadjm-Tehrani:

Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design. 347-361 - Rafael Fedler, Sebastian Banescu

, Alexander Pretschner:
ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity. 362-371
Cyber Security and Integration
- Chris W. Johnson:

Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications. 375-384 - Peter T. Popov

:
Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device. 385-399 - Chris W. Johnson:

Organisational, Political and Technical Barriers to the Integration of Safety and Cyber-Security Incident Reporting Systems. 400-409 - Georg Macher

, Andrea Höller, Harald Sporer, Eric Armengaud
, Christian Kreiner
:
A Comprehensive Safety, Security, and Serviceability Assessment Method. 410-424
Programming and Compiling
- Jörg Brauer, Markus Dahlweid, Tobias Pankrath, Jan Peleska:

Source-Code-to-Object-Code Traceability Analysis for Avionics Software: Don't Trust Your Compiler. 427-440 - Paul Muntean

, Vasantha Kommanapalli, Andreas Ibing, Claudia Eckert:
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT. 441-456 - Navid Rajabpour, Yasser Sedaghat

:
A Software-Based Error Detection Technique for Monitoring the Program Execution of RTUs in SCADA. 457-470 - Jian Xiang, John C. Knight, Kevin J. Sullivan:

Real-World Types and Their Application. 471-484

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














