


default search action
39th SAFECOMP 2020: Lisbon, Portugal
- António Casimiro
, Frank Ortmeier
, Friedemann Bitsch
, Pedro Ferreira
:
Computer Safety, Reliability, and Security - 39th International Conference, SAFECOMP 2020, Lisbon, Portugal, September 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12234, Springer 2020, ISBN 978-3-030-54548-2
Safety Cases and Argumentation
- Jan Reich
, Daniel Schneider, Ioannis Sorokos, Yiannis Papadopoulos, Tim Kelly, Ran Wei, Eric Armengaud
, Cem Kaypmaz:
Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities. 3-17 - Thomas Chowdhury, Alan Wassyng, Richard F. Paige, Mark Lawford:
Systematic Evaluation of (Safety) Assurance Cases. 18-33 - Torin Viger, Rick Salay, Gehan M. K. Selim, Marsha Chechik:
Just Enough Formality in Assurance Argument Structures. 34-49 - Georg Hake, Sebastian Feuerstack
, Axel Hahn:
Towards Recertification of Modular Updates in Integrated Maritime Systems of Systems. 50-63
Formal Verification and Analysis
- Katharina Ceesay-Seitz
, Hamza Boukabache
, Daniel Perrin
:
A Functional Verification Methodology for Highly Parametrizable, Continuously Operating Safety-Critical FPGA Designs: Applied to the CERN RadiatiOn Monitoring Electronics (CROME). 67-81 - Shahid Khan
, Joost-Pieter Katoen
, Marc Bouissou
:
A Compositional Semantics for Repairable BDMPs. 82-98 - Marco Bozzano, Peter Munk, Markus Schweizer, Stefano Tonetta, Viktória Vozárová:
Model-Based Safety Analysis of Mode Transitions. 99-114 - Georgios Giantamidis, Stylianos Basagiannis
, Stavros Tripakis:
Efficient Translation of Safety LTL to DFA Using Symbolic Automata Learning and Inductive Inference. 115-129
Security Modelling and Methods
- Max von Hippel, Cole Vick
, Stavros Tripakis, Cristina Nita-Rotaru:
Automated Attacker Synthesis for Distributed Protocols. 133-149 - Christopher J. Deloglos, Carl R. Elks, Ashraf Tantawy:
An Attacker Modeling Framework for the Assessment of Cyber-Physical Systems Security. 150-163 - Markus Heinrich
, Dominik Renkel, Tolga Arul
, Stefan Katzenbeisser:
Predicting Railway Signalling Commands Using Neural Networks for Anomaly Detection. 164-178 - Tabea Schmidt, Florian Hauer, Alexander Pretschner:
Automated Anomaly Detection in CPS Log Files - A Time Series Clustering Approach. 179-194
Assurance of Learning-Enabled Systems
- Lydia Gauerhof, Richard Hawkins, Chiara Picardi, Colin Paterson, Yuki Hagiwara, Ibrahim Habli:
Assuring the Safety of Machine Learning for Pedestrian Detection at Crossings. 197-212 - Chih-Hong Cheng:
Safety-Aware Hardening of 3D Object Detection Neural Network Systems. 213-227 - Susmit Jha, John Rushby, Natarajan Shankar:
Model-Centered Assurance for Autonomous Systems. 228-243 - Xingyu Zhao
, Alec Banks, James Sharp
, Valentin Robu
, David Flynn
, Michael Fisher
, Xiaowei Huang
:
A Safety Framework for Critical Systems Utilising Deep Neural Networks. 244-259 - Rob Ashmore, James Sharp
:
Assurance Argument Elements for Off-the-Shelf, Complex Computational Hardware. 260-269 - Erfan Asaadi, Ewen Denney, Ganesh Pai:
Quantifying Assurance in Learning-Enabled Systems. 270-286
Practical Experience and Tools
- Uwe Becker
:
Cyber-Security of Neural Networks in Medical Devices. 289-297 - Carmen Cârlan, Daniel Ratiu:
FASTEN.Safe: A Model-Driven Engineering Tool to Experiment with Checkable Assurance Cases. 298-306
Threat Analysis and Risk Mitigation
- Hideaki Nishihara
, Yasuyuki Kawanishi
, Daisuke Souma
, Hirotaka Yoshida
:
On Validating Attack Trees with Attack Effects. 309-324 - Dominik Püllen, Nikolaos A. Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle. 325-340 - Kenji Taguchi
, Ryo Kurachi
, Kiyoshi Sasaki, Nobuhiko Nakamura, Kazuki Tomonaga, Shuhei Yamashita:
Threat Analysis Framework for Safety Architectures in SCDL. 341-354
Cyber-Physical Systems Security
- Joachim Fellmuth, Julian Hartmer, Hanno Skowronek, Sabine Glesner:
Efficient Load-Time Diversity for an Embedded Real-Time Operating System. 357-371 - Lukas Gressl, Michael Krisper
, Christian Steger
, Ulrich Neffe:
Towards an Automated Exploration of Secure IoT/CPS Design-Variants. 372-386 - Andreas Fuchs, Dustin Kern
, Christoph Krauß
, Maria Zhdanova
:
Securing Electric Vehicle Charging Systems Through Component Binding. 387-401
Fault Injection and Fault Tolerance
- Jens Vankeirsbilck
, Hans Hallez
, Jeroen Boydens
:
Using Hardware-In-Loop-Based Fault Injection to Determine the Effects of Control Flow Errors in Industrial Control Programs. 405-418 - João R. Campos
, Ernesto Costa
, Marco Vieira
:
On Configuring a Testbed for Dependability Experiments: Guidelines and Fault Injection Case Study. 419-433 - Philippe A. Palanque, Andy Cockburn, Carl Gutwin:
A Classification of Faults Covering the Human-Computer Interaction Loop. 434-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.