Conferences in DBLP
Robert Alexander , Dimitar Kazakov , Tim Kelly System of Systems Hazard Analysis Using Simulation and Machine Learning. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:1-14 [Conf ] Igor Nai Fovino , Marcelo Masera Through the Description of Attacks: A Multidimensional View. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:15-28 [Conf ] Tomasz Gierszewski , Wojciech Molisz , Jacek Rak On Certain Behavior of Scale-Free Networks Under Malicious Attacks. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:29-41 [Conf ] Lassaad Cheikhrouhou , Georg Rock , Werner Stephan , Matthias Schwan , Gunter Lassmann Verifying a Chipcard-Based Biometric Identification Protocol in VSE. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:42-56 [Conf ] Felicjan Rydzak , Lars S. Breistrand , Finn Olav Sveen , Ying Qian , Jose J. Gonzalez Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:57-70 [Conf ] Eimantas Garsva Computer System Survivability Modelling by Using Stochastic Activity Network. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:71-84 [Conf ] Jang-Soo Lee , Arndt Lindner , Jong-Gyun Choi , Horst Miedl , Kee-Choon Kwon Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:85-98 [Conf ] I-Hsin Chou , Chin-Feng Fan Regulatory Software Configuration Management System Design. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:99-112 [Conf ] Mário Brito , John May Gaining Confidence in the Software Development Process Using Expert Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:113-126 [Conf ] Richard Banach , Marco Bozzano Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:127-141 [Conf ] Thomas Santen Stepwise Development of Secure Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:142-155 [Conf ] Holger Giese , Matthias Tichy Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:156-169 [Conf ] Wojciech Mazurczyk , Zbigniew Kotulski New VoIP Traffic Security Scheme with Digital Watermarking. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:170-181 [Conf ] Joaquín García-Alfaro , Frédéric Cuppens , Nora Cuppens-Boulahia Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:182-194 [Conf ] Byungryong Kim Using Group Overlapping to Protect Server from Attack in Grid Computing. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:195-204 [Conf ] Andrzej Wardzinski The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:205-218 [Conf ] Mark A. Sujan , Michael D. Harrison , Alison Steven , Pauline H. Pearson , Susan J. Vernon Demonstration of Safety in Healthcare Organisations. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:219-232 [Conf ] Won Jay Song , Moon Kyo Cho , Im Sook Há , Mun Kee Choi Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:233-246 [Conf ] Fredrik Törner , Per Johannessen , Peter Öhman Assessment of Hazard Identification Methods for the Automotive Domain. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:247-260 [Conf ] Dawid Trawczynski , Janusz Sosnowski , Janusz Zalewski A Tool for Databus Safety Analysis Using Fault Injection. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:261-274 [Conf ] Thomas Peikenkamp , Antonella Cavallo , Laura Valacca , Eckard Böde , Matthias Pretzer , E. Moritz Hahn Towards a Unified Model-Based Safety Assessment. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:275-288 [Conf ] Piotr Cholda , Jerzy Domzal , Andrzej Jajszczyk , Krzysztof Wajda Reliability Analysis of Resilient Packet Rings. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:289-301 [Conf ] Meine van der Meulen , Miguel A. Revilla Experiences with the Design of a Run-Time Check. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:302-315 [Conf ] Andrzej Bialas Development of an Integrated, Risk-Based Platform for Information and E-Services Security. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:316-329 [Conf ] Martin Hall-May , Tim Kelly Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:330-343 [Conf ] Marcin Szpyrka , Tomasz Szmuc Verification of Automatic Train Protection Systems with RTCP-Nets. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:344-357 [Conf ] Rupert Schlick , Wolfgang Herzner , Thierry Le Sergent Checking SCADE Models for Correct Usage of Physical Units. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:358-371 [Conf ] Erwin Schoitsch , Egbert Althammer , Henrik Eriksson , Jonny Vinter , László Gönczy , András Pataricza , György Csertán Validation and Certification of Safety-Critical Embedded Systems - The DECOS Test Bench. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:372-385 [Conf ] Martin Schlager , Wolfgang Herzner , Andreas Wolf , Oliver Gründonner , Maximilian Rosenblattl , Erwin Erkinger Encapsulating Application Subsystems Using the DECOS Core OS. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:386-397 [Conf ] Kirsten Berkenkötter , Ulrich Hannemann Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:398-411 [Conf ] Aneta Poniszewska-Maranda Access Control Coherence of Information Systems Based on Security Constraints. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:412-425 [Conf ] Norbert Oster , Francesca Saglietti Automatic Test Data Generation by Multi-objective Optimisation. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2006, pp:426-438 [Conf ]