Abstract is missing.
- System of Systems Hazard Analysis Using Simulation and Machine LearningRobert Alexander, Dimitar Kazakov, Tim Kelly. 1-14 [doi]
- Through the Description of Attacks: A Multidimensional ViewIgor Nai Fovino, Marcelo Masera. 15-28 [doi]
- On Certain Behavior of Scale-Free Networks Under Malicious AttacksTomasz Gierszewski, Wojciech Molisz, Jacek Rak. 29-41 [doi]
- Verifying a Chipcard-Based Biometric Identification Protocol in VSELassaad Cheikhrouhou, Georg Rock, Werner Stephan, Matthias Schwan, Gunter Lassmann. 42-56 [doi]
- Exploring Resilience Towards Risks in eOperations in the Oil and Gas IndustryFelicjan Rydzak, Lars S. Breistrand, Finn Olav Sveen, Ying Qian, Jose J. Gonzalez. 57-70 [doi]
- Computer System Survivability Modelling by Using Stochastic Activity NetworkEimantas Garsva. 71-84 [doi]
- Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power PlantJang-Soo Lee, Arndt Lindner, Jong-Gyun Choi, Horst Miedl, Kee-Choon Kwon. 85-98 [doi]
- Regulatory Software Configuration Management System DesignI-Hsin Chou, Chin-Feng Fan. 99-112 [doi]
- Gaining Confidence in the Software Development Process Using Expert SystemsMário Brito, John May. 113-126 [doi]
- Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic SystemsRichard Banach, Marco Bozzano. 127-141 [doi]
- Stepwise Development of Secure SystemsThomas Santen. 142-155 [doi]
- Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-ReconfigurationHolger Giese, Matthias Tichy. 156-169 [doi]
- New VoIP Traffic Security Scheme with Digital WatermarkingWojciech Mazurczyk, Zbigniew Kotulski. 170-181 [doi]
- Towards Filtering and Alerting Rule Rewriting on Single-Component PoliciesJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. 182-194 [doi]
- Using Group Overlapping to Protect Server from Attack in Grid ComputingByungryong Kim. 195-204 [doi]
- The Role of Situation Awareness in Assuring Safety of Autonomous VehiclesAndrzej Wardzinski. 205-218 [doi]
- Demonstration of Safety in Healthcare OrganisationsMark A. Sujan, Michael D. Harrison, Alison Steven, Pauline H. Pearson, Susan J. Vernon. 219-232 [doi]
- Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor NetworksWon Jay Song, Moon Kyo Cho, Im Sook Há, Mun Kee Choi. 233-246 [doi]
- Assessment of Hazard Identification Methods for the Automotive DomainFredrik Törner, Per Johannessen, Peter Öhman. 247-260 [doi]
- A Tool for Databus Safety Analysis Using Fault InjectionDawid Trawczynski, Janusz Sosnowski, Janusz Zalewski. 261-274 [doi]
- Towards a Unified Model-Based Safety AssessmentThomas Peikenkamp, Antonella Cavallo, Laura Valacca, Eckard Böde, Matthias Pretzer, Ernst Moritz Hahn. 275-288 [doi]
- Reliability Analysis of Resilient Packet RingsPiotr Cholda, Jerzy Domzal, Andrzej Jajszczyk, Krzysztof Wajda. 289-301 [doi]
- Experiences with the Design of a Run-Time CheckMeine van der Meulen, Miguel A. Revilla. 302-315 [doi]
- Development of an Integrated, Risk-Based Platform for Information and E-Services SecurityAndrzej Bialas. 316-329 [doi]
- Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of SystemsMartin Hall-May, Tim Kelly. 330-343 [doi]
- Verification of Automatic Train Protection Systems with RTCP-NetsMarcin Szpyrka, Tomasz Szmuc. 344-357 [doi]
- Checking SCADE Models for Correct Usage of Physical UnitsRupert Schlick, Wolfgang Herzner, Thierry Le Sergent. 358-371 [doi]
- Validation and Certification of Safety-Critical Embedded Systems - The DECOS Test BenchErwin Schoitsch, Egbert Althammer, Henrik Eriksson, Jonny Vinter, László Gönczy, András Pataricza, György Csertán. 372-385 [doi]
- Encapsulating Application Subsystems Using the DECOS Core OSMartin Schlager, Wolfgang Herzner, Andreas Wolf, Oliver Gründonner, Maximilian Rosenblattl, Erwin Erkinger. 386-397 [doi]
- Modeling the Railway Control Domain Rigorously with a UML 2.0 ProfileKirsten Berkenkötter, Ulrich Hannemann. 398-411 [doi]
- Access Control Coherence of Information Systems Based on Security ConstraintsAneta Poniszewska-Maranda. 412-425 [doi]
- Automatic Test Data Generation by Multi-objective OptimisationNorbert Oster, Francesca Saglietti. 426-438 [doi]