001480823 000__ 05597cam\\22007097i\4500 001480823 001__ 1480823 001480823 003__ OCoLC 001480823 005__ 20231031003310.0 001480823 006__ m\\\\\o\\d\\\\\\\\ 001480823 007__ cr\un\nnnunnun 001480823 008__ 230915s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001480823 019__ $$a1396975057 001480823 020__ $$a9783031409233$$q(electronic bk.) 001480823 020__ $$a303140923X$$q(electronic bk.) 001480823 020__ $$z9783031409226 001480823 020__ $$z3031409221 001480823 0247_ $$a10.1007/978-3-031-40923-3$$2doi 001480823 035__ $$aSP(OCoLC)1397340438 001480823 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dOCLCO$$dWSU 001480823 049__ $$aISEA 001480823 050_4 $$aQA76.9.A25 001480823 08204 $$a005.8$$223/eng/20230915 001480823 1112_ $$aSAFECOMP (Conference)$$n(42nd :$$d2023 :$$cToulouse, France) 001480823 24510 $$aComputer safety, reliability, and security :$$b42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20-22, 2023, Proceedings /$$cJérémie Guiochet, Stefano Tonetta, Friedemann Bitsch, editors. 001480823 2463_ $$aSAFECOMP 2023 001480823 264_1 $$aCham :$$bSpringer,$$c2023. 001480823 300__ $$a1 online resource (xvii, 284 pages) :$$billustrations (some color). 001480823 336__ $$atext$$btxt$$2rdacontent 001480823 337__ $$acomputer$$bc$$2rdamedia 001480823 338__ $$aonline resource$$bcr$$2rdacarrier 001480823 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v14181 001480823 500__ $$aIncludes author index. 001480823 5050_ $$aSafety Assurance -- Assurance Case Arguments in the Large : CERN LHC Machine Protection System -- Identifying Run-time Monitoring Requirements for Autonomous Systems through the Analysis of Safety Arguments -- Redesigning Medical Device Assurance: Separating Technological and Clinical Assurance Cases -- Software Testing & Reliability -- A Cognitive Framework for Modeling Coincident Software Faults: An Experimental Study -- A Taxonomy of Software Defect Forms for Certification Tests in Aviation Industry -- Constraint-guided Test Execution Scheduling: An Experience Report at ABB Robotics -- Neural Networks Robustness & Monitoring -- A low-cost strategic monitoring approach for scalable and interpretable error detection in deep neural networks -- Are Transformers More Robust? Towards Exact Robustness Verification for Transformers -- Model-based Security and Threat Analysis -- Model-based Generation of Attack-Fault Trees -- MBTA: A Model-Based Threat Analysis approach for software architectures -- Attribute Repair for Threat Prevention -- Safety of Autonomous Driving -- Probabilistic Spatial Relations for Monitoring Behavior of Road Users -- Concept and metamodel to support cross-domain safety analysis for ODD expansion of autonomous systems -- Security Engineering -- Pattern-Based Information Flow Control for Safety-Critical On-Chip Systems -- From Standard to Practice: Towards ISA/IEC 62443-conform Public Key Infrastructures -- AI Safety -- The Impact of Training Data Shortfalls on Safety of AI-based Clinical Decision Support Systems -- Data-centric Operational Design Domain Characterization for Machine Learning-based Aeronautical Products -- Online Quantization Adaptation for Fault-Tolerant Neural Network Inference -- Neural Networks & Testing -- Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection -- Towards Scenario-based Safety Validation for Autonomous Trains with Deep Generative Models. 001480823 506__ $$aAccess limited to authorized users. 001480823 520__ $$aThis book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023. The 20 full papers included in this volume were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Safety assurance; software testing and reliability; neural networks robustness and monitoring; model-based security and threat analysis; safety of autonomous driving; security engineering; AI safety; and neural networks and testing. 001480823 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 15, 2023). 001480823 650_6 $$aSécurité informatique$$vCongrès. 001480823 650_6 $$aOrdinateurs$$xConception et construction$$vCongrès. 001480823 650_6 $$aGénie logiciel$$vCongrès. 001480823 650_6 $$aLogique informatique$$vCongrès. 001480823 650_6 $$aLogiciels d'application$$xSécurité$$xMesures$$vCongrès. 001480823 650_0 $$aComputer security$$vCongresses. 001480823 650_0 $$aComputer organization$$vCongresses. 001480823 650_0 $$aSoftware engineering$$vCongresses.$$vCongresses$$0(DLC)sh2008111658 001480823 650_0 $$aProgramming languages (Electronic computers)$$vCongresses. 001480823 650_0 $$aComputer logic$$vCongresses.$$vCongresses$$0(DLC)sh2009121216 001480823 650_0 $$aApplication software$$xSecurity measures$$vCongresses. 001480823 655_0 $$aElectronic books. 001480823 655_7 $$aConference papers and proceedings.$$2lcgft 001480823 7001_ $$aGuiochet, Jérémie,$$eeditor.$$1https://orcid.org/0000-0002-1285-8974 001480823 7001_ $$aTonetta, Stefano,$$eeditor.$$1https://orcid.org/0000-0001-9091-7899 001480823 7001_ $$aBitsch, Friedemann,$$eeditor.$$1https://orcid.org/0000-0001-6152-4121 001480823 77608 $$iPrint version: $$z3031409221$$z9783031409226$$w(OCoLC)1389607854 001480823 830_0 $$aLecture notes in computer science ;$$v14181.$$x1611-3349 001480823 852__ $$bebk 001480823 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-40923-3$$zOnline Access$$91397441.1 001480823 909CO $$ooai:library.usi.edu:1480823$$pGLOBAL_SET 001480823 980__ $$aBIB 001480823 980__ $$aEBOOK 001480823 982__ $$aEbook 001480823 983__ $$aOnline 001480823 994__ $$a92$$bISE