Abstract is missing.
- FISSC: A Fault Injection and Simulation Secure CollectionLouis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Le, Aude Crohen, Philippe de Choudens. 3-11 [doi]
- FIDL: A Fault Injection Description Language for Compiler-Based SFI ToolsMaryam Raiyat Aliabadi, Karthik Pattabiraman. 12-23 [doi]
- Using Process Models in System AssuranceRichard Hawkins, Thomas Richardson, Tim Kelly. 27-38 [doi]
- The Indispensable Role of Rationale in Safety StandardsJohn C. Knight, Jonathan C. Rowanhill. 39-50 [doi]
- Composition of Safety Argument PatternsEwen Denney, Ganesh J. Pai. 51-63 [doi]
- Formal Analysis of Security Properties on the OPC-UA SCADA ProtocolMaxime Puys, Marie-Laure Potet, Pascal Lafourcade 0001. 67-75 [doi]
- A Dedicated Algorithm for Verification of Interlocking SystemsQuentin Cappart, Pierre Schaus. 76-87 [doi]
- Catalogue of System and Software PropertiesVictor Bos, Harold Bruintjes, Stefano Tonetta. 88-101 [doi]
- A High-Assurance, High-Performance Hardware-Based Cross-Domain SystemDavid S. Hardin, Konrad Slind, Mark Bortz, James Potts, Scott Owens. 102-113 [doi]
- Using STPA in an ISO 26262 Compliant ProcessArchana Mallya, Vera Pantelic, Morayo Adedjouma, Mark Lawford, Alan Wassyng. 117-129 [doi]
- A Review of Threat Analysis and Risk Assessment Methods in the Automotive ContextGeorg Macher, Eric Armengaud, Eugen Brenner, Christian Kreiner. 130-141 [doi]
- Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented ArchitecturesTommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli. 145-158 [doi]
- Towards Modelling Adaptive Fault Tolerance for Resilient Computing AnalysisWilliam Excoffon, Jean-Charles Fabre, Michaël Lauer. 159-171 [doi]
- Automatic Invariant Selection for Online Anomaly DetectionLeonardo Aniello, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Leonardo Querzoni, Stefano Russo. 172-183 [doi]
- Modelling Cost-Effectiveness of Defenses in Industrial Control SystemsAndrew Fielder, Tingting Li, Chris Hankin. 187-200 [doi]
- Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack ModelingRobert Clausing, Robert Fischer 0001, Jana Dittmann, Yongjian Ding. 201-212 [doi]
- Towards Security-Explicit Formal Modelling of Safety-Critical SystemsElena Troubitsyna, Linas Laibinis, Inna Pereverzeva, Tuomas Kuismin, Dubravka Ilic, Timo Latvala. 213-225 [doi]
- A New SVM-Based Fraud Detection Model for AMIMarcelo Zanetti, Edgard Jamhour, Marcelo Eduardo Pellenz, Manoel Camillo Penna. 226-237 [doi]
- Exploiting Trust in Deterministic BuildsChristopher Jämthagen, Patrik Lantz, Martin Hell. 238-249 [doi]
- Advancing Dynamic Fault Tree Analysis - Get Succinct State Spaces Fast and Synthesise Failure RatesMatthias Volk 0001, Sebastian Junges, Joost-Pieter Katoen. 253-265 [doi]
- Effective Static and Dynamic Fault Tree AnalysisOla Bäckström, Yuliya Butkova, Holger Hermanns, Jan Krcál, Pavel Krcál. 266-280 [doi]
- SAFER-HRC: Safety Analysis Through Formal vERification in Human-Robot CollaborationMehrnoosh Askarpour, Dino Mandrioli, Matteo Rossi, Federico Vicentini. 283-295 [doi]
- Adapting the Orthogonal Defect Classification Taxonomy to the Space DomainNuno Silva, Marco Vieira. 296-308 [doi]
- Towards Cloud-Based Enactment of Safety-Related ProcessesSami Alajrami, Barbara Gallina, Irfan Sljivo, Alexander Romanovsky, Petter Isberg. 309-321 [doi]