Abstract is missing.
- Critical Information Infrastructures: Should Models Represent Structures or Functions?Erik Hollnagel. 1-4 [doi]
- Security and Interoperability for MANETs and a Fixed CoreColin O Halloran, Andy Bates. 5-11 [doi]
- Technology, Society and RiskRoger Rivett. 12 [doi]
- Panel: Complexity and ResilienceAad P. A. van Moorsel. 13-15 [doi]
- The Effectiveness of T-Way Test Data GenerationMichael Ellims, Darrel C. Ince, Marian Petre. 16-29 [doi]
- Towards Agile Engineering of High-Integrity SystemsRichard F. Paige, Ramon Charalambous, Xiaocheng Ge, Phillip J. Brooke. 30-43 [doi]
- SafeSpection - A Systematic Customization Approach for Software Hazard IdentificationChristian Denger, Mario Trapp, Peter Liggesmeyer. 44-57 [doi]
- Integrating Safety Analyses and Component-Based DesignDominik Domis, Mario Trapp. 58-71 [doi]
- Modelling Support for Design of Safety-Critical Automotive Embedded SystemsDe-Jiu Chen, Rolf Johansson, Henrik Lönn, Yiannis Papadopoulos, Anders Sandberg, Fredrik Törner, Martin Törngren. 72-85 [doi]
- Resilience in the Aviation SystemAntonio Chialastri, Simone Pozzi. 86-98 [doi]
- Resilience Markers for Safer Systems and OrganisationsJonathan Back, Dominic Furniss, Michael Hildebrandt, Ann Blandford. 99-112 [doi]
- Modeling and Analyzing Disaster Recovery Plans as Business ProcessesAndrzej Zalewski, Piotr Sztandera, Marcin Ludzia, Marek Zalewski. 113-125 [doi]
- Analysis of Nested CRC with Additional Net Data in CommunicationTina Mattes, Frank Schiller, Annemarie Mörwald, Thomas Honold. 126-138 [doi]
- Symbolic Reliability Analysis of Self-healing Networked Embedded SystemsMichael Glaß, Martin Lukasiewycz, Felix Reimann, Christian Haubelt, Jürgen Teich. 139-152 [doi]
- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller RegistersYasser Sedaghat, Seyed Ghassem Miremadi. 153-166 [doi]
- Secure Interaction Models for the HealthAgents SystemLiang Xiao 0002, Paul H. Lewis, Srinandan Dasmahapatra. 167-180 [doi]
- Security Challenges in Adaptive e-Health ProcessesMichael Predeschly, Peter Dadam, Hilmar Acker. 181-192 [doi]
- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be HonestAbdullah Alaraj, Malcolm Munro. 193-206 [doi]
- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in VehiclesDennis K. Nilsson, Ulf Larson, Erland Jonsson. 207-220 [doi]
- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event DataDanielle Chrun, Michel Cukier, Gerry Sneeringer. 221-234 [doi]
- Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term CountermeasuresTobias Hoppe, Stefan Kiltz, Jana Dittmann. 235-248 [doi]
- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification InformationNurlida Basir, Ewen Denney, Bernd Fischer. 249-262 [doi]
- Applying Safety Goals to a New Intensive Care Workstation SystemUwe Becker. 263-276 [doi]
- Safety Assurance Strategies for Autonomous VehiclesAndrzej Wardzinski. 277-290 [doi]
- Expert Assessment of Arguments: A Method and Its Experimental EvaluationLukasz Cyra, Janusz Górski. 291-304 [doi]
- Formal Verification by Reverse SynthesisXiang Yin, John C. Knight, Elisabeth A. Nguyen, Westley Weimer. 305-319 [doi]
- Deriving Safety Software Requirements from an AltaRica System ModelSophie Humbert, Christel Seguin, Charles Castel, Jean-Marc Bosc. 320-331 [doi]
- Model-Based Implementation of Real-Time SystemsKrzysztof Sacha. 332-345 [doi]
- Early Prototyping of Wireless Sensor Network Algorithms in PVSCinzia Bernardeschi, Paolo Masci, Holger Pfeifer. 346-359 [doi]
- Analyzing Fault Susceptibility of ABS MicrocontrollerDawid Trawczynski, Janusz Sosnowski, Piotr Gawkowski. 360-372 [doi]
- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive SystemsDavid Navarre, Philippe A. Palanque, Sandra Basnyat. 373-386 [doi]
- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental ProjectsAlberto Pasquini, Simone Pozzi, Luca Save. 387-400 [doi]
- A Context-Aware Mandatory Access Control Model for Multilevel Security EnvironmentsJafar Haadi Jafarian, Morteza Amini, Rasool Jalili. 401-414 [doi]
- Formal Security Analysis of Electronic Software Distribution SystemsMonika Maidl, David von Oheimb, Peter Hartmann, Richard Robinson. 415-428 [doi]
- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability ModelingAyman Z. Faza, Sahra Sedigh, Bruce M. McMillin. 429-439 [doi]
- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded SystemsAyman K. Gendy, Michael J. Pont. 440-453 [doi]