Abstract is missing.
- Medical Devices, Electronic Health Records and Assuring Patient Safety: Future Challenges?Cor J. Kalkman. 3-6 [doi]
- Cyber (In-)security of Industrial Control Systems: A Societal ChallengeEric A. M. Luiijf. 7-15 [doi]
- Modeling Guidelines and Usage Analysis Towards Applying HiP-HOPS Method to Airborne Electrical SystemsCarolina D. Villela, Humberto H. Sano, Juliana M. Bezerra. 19-28 [doi]
- The Formal Derivation of Mode Logic for Autonomous Satellite Flight FormationAnton Tarasyuk, Inna Pereverzeva, Elena Troubitsyna, Timo Latvala. 29-43 [doi]
- Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional TransitionsRobert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann. 47-58 [doi]
- Improving Dependability of Vision-Based Advanced Driver Assistance Systems Using Navigation Data and Checkpoint RecognitionAyhan Mehmed, Sasikumar Punnekkat, Wilfried Steiner, Giacomo Spampinato, Martin Lettner. 59-73 [doi]
- Safely Using the AUTOSAR End-to-End Protection LibraryThomas Arts, Stefano Tonetta. 74-89 [doi]
- A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier InterfaceKristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel. 90-108 [doi]
- Model-Based Analysis for Safety Critical SoftwareStefan Gulan, Jens Harnisch, Sven Johr, Roberto Kretschmer, Stefan Rieger, Rafael Zalman. 111-120 [doi]
- Integrated Safety Analysis Using Systems-Theoretic Process Analysis and Software Model CheckingAsim Abdulkhaleq, Stefan Wagner 0001. 121-134 [doi]
- Back-to-Back Fault Injection Testing in Model-Based DevelopmentPeter Folkesson, Fatemeh Ayatolahi, Behrooz Sangchoolie, Jonny Vinter, Mafijul Md. Islam, Johan Karlsson. 135-148 [doi]
- Understanding the Effects of Data Corruption on Application Behavior Based on Data CharacteristicsGeorgios Stefanakis, Vijay Nagarajan, Marcelo Cintra. 151-165 [doi]
- A Multi-layer Anomaly Detector for Dynamic Service-Based SystemsAndrea Ceccarelli, Tommaso Zoppi, Massimiliano Leone Itria, Andrea Bondavalli. 166-180 [doi]
- Safety Case Driven Development for Medical DevicesAlejandra Ruiz, Paulo Barbosa, Yang Medeiros, Huáscar Espinoza. 183-196 [doi]
- Towards an International Security Case Framework for Networked Medical DevicesAnita Finnegan, Fergal McCaffery. 197-209 [doi]
- Systems-Theoretic Safety Assessment of Robotic Telesurgical SystemsHoma Alemzadeh, Daniel Chen, Andrew Lewis, Zbigniew T. Kalbarczyk, Jaishankar Raman, Nancy Leveson, Ravishankar K. Iyer. 213-227 [doi]
- Towards Assurance for Plug & Play Medical SystemsAndrew L. King, Lu Feng, Sam Procter, Sanjian Chen, Oleg Sokolsky, John Hatcliff, Insup Lee. 228-242 [doi]
- Risk Classification of Data Transfer in Medical SystemsDagmar Rosenbrand, Rob de Weerd, Lex Bothe, Jan Jaap Baalbergen. 243-251 [doi]
- Requirement Engineering for Functional Alarm System for Interoperable Medical DevicesKrishna K. Venkatasubramanian, Eugene Y. Vasserman, Vasiliki Sfyrla, Oleg Sokolsky, Insup Lee. 252-266 [doi]
- The Safety Requirements Decomposition PatternPablo Oliveira Antonino, Mario Trapp, Paulo Barbosa, Edmar C. Gurjäo, Jeferson Rosário. 269-282 [doi]
- Automatic Architecture Hardening Using Safety PatternsKevin Delmas, Rémi Delmas, Claire Pagetti. 283-296 [doi]
- Modeling the Impact of Testing on Diverse ProgramsPeter Bishop. 297-309 [doi]
- A Model for Safety Case Confidence AssessmentJérémie Guiochet, Quynh Anh Do Hoang, Mohamed Kaâniche. 313-327 [doi]
- Towards a Formal Basis for Modular Safety CasesEwen Denney, Ganesh J. Pai. 328-343 [doi]
- Quantifying Risks to Data Assets Using Formal Metrics in Embedded System DesignMaria Vasilevskaya, Simin Nadjm-Tehrani. 347-361 [doi]
- ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software DiversityRafael Fedler, Sebastian Banescu, Alexander Pretschner. 362-371 [doi]
- Barriers to the Use of Intrusion Detection Systems in Safety-Critical ApplicationsChris W. Johnson. 375-384 [doi]
- Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D DevicePeter T. Popov. 385-399 [doi]
- Organisational, Political and Technical Barriers to the Integration of Safety and Cyber-Security Incident Reporting SystemsChris W. Johnson. 400-409 [doi]
- A Comprehensive Safety, Security, and Serviceability Assessment MethodGeorg Macher, Andrea Höller, Harald Sporer, Eric Armengaud, Christian Kreiner. 410-424 [doi]
- Source-Code-to-Object-Code Traceability Analysis for Avionics Software: Don't Trust Your CompilerJörg Brauer, Markus Dahlweid, Tobias Pankrath, Jan Peleska. 427-440 [doi]
- Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMTPaul Muntean, Vasantha Kommanapalli, Andreas Ibing, Claudia Eckert. 441-456 [doi]
- A Software-Based Error Detection Technique for Monitoring the Program Execution of RTUs in SCADANavid Rajabpour, Yasser Sedaghat. 457-470 [doi]
- Real-World Types and Their ApplicationJian Xiang, John C. Knight, Kevin J. Sullivan. 471-484 [doi]