Nome |
# |
On Algorithms Selection for Unsupervised Anomaly Detection, file e398c37d-b7e0-179a-e053-3705fe0a4cff
|
2.409
|
Context-Awareness to improve Anomaly Detection in Dynamic Service Oriented Architectures, file e398c37a-6ff1-179a-e053-3705fe0a4cff
|
360
|
Continuous Biometric Verification for Non-Repudiation of Remote Services, file e398c37c-12cb-179a-e053-3705fe0a4cff
|
336
|
Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile, file e398c37b-ecbb-179a-e053-3705fe0a4cff
|
317
|
Development and validation of a safe communication protocol compliant to railway standards, file e398c380-e4dd-179a-e053-3705fe0a4cff
|
302
|
CYBER-PHYSICAL SYSTEMS OF SYSTEMS
Foundations, a conceptual model and some derivations: the AMADEOS legacy, file e398c37d-3228-179a-e053-3705fe0a4cff
|
294
|
Certifications of Critical Systems - The CECRIS Experience, file e398c37d-4b3b-179a-e053-3705fe0a4cff
|
250
|
Continuous User Identity Verification for Trusted Operators in Control Rooms, file e398c379-da86-179a-e053-3705fe0a4cff
|
249
|
On the evaluation measures for machine learning algorithms for safety-critical systems, file e398c380-a08e-179a-e053-3705fe0a4cff
|
213
|
Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection, file e398c380-d5cd-179a-e053-3705fe0a4cff
|
209
|
Exploring Anomaly Detection in Systems of Systems, file e398c37b-203b-179a-e053-3705fe0a4cff
|
207
|
A conceptual model for analyzing information quality in System-of-Systems, file e398c37c-695d-179a-e053-3705fe0a4cff
|
195
|
Composable Framework Support for Software-FMEA through Model Execution, file e398c37d-4b3f-179a-e053-3705fe0a4cff
|
185
|
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives, file 16c7d915-009b-4635-9913-73d871243a3d
|
182
|
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d5d2-179a-e053-3705fe0a4cff
|
181
|
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application, file e398c381-5448-179a-e053-3705fe0a4cff
|
180
|
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c37f-4a34-179a-e053-3705fe0a4cff
|
168
|
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c37a-4afb-179a-e053-3705fe0a4cff
|
164
|
Identification of critical situations via Event Processing and Event Trust Analysis, file e398c380-c9b1-179a-e053-3705fe0a4cff
|
164
|
Continuous and Transparent User Identity Verification for Secure Internet Services, file e398c37f-1ae4-179a-e053-3705fe0a4cff
|
152
|
A Monitoring and Testing Framework for Critical Off-the-Shelf Applications and Services, file e398c37d-2023-179a-e053-3705fe0a4cff
|
146
|
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c37f-575e-179a-e053-3705fe0a4cff
|
146
|
Design, implementation, and assessment of a usable multi-biometric continuous authentication system, file e398c37f-1432-179a-e053-3705fe0a4cff
|
144
|
QoS Perceived by Users of Ubiquitous UMTS:Compositional Models and Thorough Analysis, file e398c378-a392-179a-e053-3705fe0a4cff
|
134
|
Performability analysis of a tramway system with virtual tags and local positioning, file e398c37f-8b21-179a-e053-3705fe0a4cff
|
134
|
Emergence in cyber-physical systems-of-systems (CPSoSs), file e398c37d-3227-179a-e053-3705fe0a4cff
|
130
|
Toward a model-based approach for analyzing information quality requirements for smart grid, file e398c37e-c629-179a-e053-3705fe0a4cff
|
120
|
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c381-07fd-179a-e053-3705fe0a4cff
|
117
|
Modeling QoE in Dependable Tele-Immersive Applications: A Case Study of World Opera, file e398c37a-75a2-179a-e053-3705fe0a4cff
|
115
|
A template-based methodology for the specification and automated composition of performability models, file e398c37f-4220-179a-e053-3705fe0a4cff
|
106
|
On trustworthy measurements when testing dependable systems: a discussion and experiences, file e398c37f-4703-179a-e053-3705fe0a4cff
|
106
|
On the educated selection of unsupervised algorithms via attacks and anomaly classes, file e398c37f-3ffa-179a-e053-3705fe0a4cff
|
91
|
Meta-learning to improve unsupervised intrusion detection in cyber-physical systems, file e398c381-2793-179a-e053-3705fe0a4cff
|
91
|
Introducing Meta-Requirements for Describing System of Systems, file e398c380-b76a-179a-e053-3705fe0a4cff
|
88
|
A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain, file e398c380-e647-179a-e053-3705fe0a4cff
|
81
|
Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform, file e398c381-1aa0-179a-e053-3705fe0a4cff
|
78
|
Risk assessment of a biometric continuous authentication protocol for internet services, file e398c37b-9412-179a-e053-3705fe0a4cff
|
75
|
Labelling Relevant Events to Support the Crisis Management Operator, file e398c37b-90e4-179a-e053-3705fe0a4cff
|
71
|
Cost Estimation for Independent Systems Verification and Validation, file e398c37d-0573-179a-e053-3705fe0a4cff
|
66
|
Lightweight Formal Analysis of Requirements, file e398c37d-0575-179a-e053-3705fe0a4cff
|
58
|
A requirements-driven methodology for the proper selection and configuration of blockchains, file e398c380-c4aa-179a-e053-3705fe0a4cff
|
53
|
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems, file e398c380-2584-179a-e053-3705fe0a4cff
|
49
|
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection, file 2f15baaf-c4bf-43a6-972b-eb4b37be6414
|
42
|
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape, file 0b6144c5-cc38-4cd3-8718-a827cc12ae85
|
41
|
Stochastic Activity Networks Templates: Supporting Variability in Performability Models, file e398c381-dff5-179a-e053-3705fe0a4cff
|
39
|
SYSML-UML Like Modeling Environment Based on Google Blockly Customization, file e398c37d-0571-179a-e053-3705fe0a4cff
|
36
|
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c381-14ec-179a-e053-3705fe0a4cff
|
33
|
A multi-criteria ranking of security countermeasures, file e398c381-0de1-179a-e053-3705fe0a4cff
|
32
|
Impact of Machine Learning on Safety Monitors, file 74180b41-c9de-4d8b-ab5d-8dd2c753cb38
|
31
|
A stochastic modeling approach for traffic analysis of a tramway system with virtual tags and local positioning, file e398c381-56ec-179a-e053-3705fe0a4cff
|
31
|
On the Need of a Methodological Approach for the Assessment of Software Architectures within ISO26262, file e398c378-faa5-179a-e053-3705fe0a4cff
|
26
|
Tolerate Failures of the Visual Camera With Robust Image Classifiers, file b7771d0c-fec1-43ad-ae83-05a6a9386978
|
25
|
A template-based methodology for the specification and automated composition of performability models, file e398c380-d3ff-179a-e053-3705fe0a4cff
|
25
|
Robust Traffic Sign Recognition Against Camera Failures, file 0c9eb9ab-78aa-4d1a-a33a-73ce0459c768
|
24
|
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c380-c89b-179a-e053-3705fe0a4cff
|
21
|
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c381-14eb-179a-e053-3705fe0a4cff
|
19
|
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems, file e398c379-5b75-179a-e053-3705fe0a4cff
|
16
|
Towards Enhancing Traffic Sign Recognition through Sliding Windows, file e398c382-43a4-179a-e053-3705fe0a4cff
|
16
|
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach, file e398c37f-2929-179a-e053-3705fe0a4cff
|
15
|
Metodo e apparato per una segnalazione resiliente del tempo, file e398c380-bb91-179a-e053-3705fe0a4cff
|
15
|
On the Properness of Incorporating Binary Classification Machine Learning Algorithms into Safety-Critical Systems, file 7302960d-403d-4fbd-8b38-214477409a57
|
10
|
Design and Evaluation of a Safe Driver Machine Interface, file e398c378-a3aa-179a-e053-3705fe0a4cff
|
10
|
A Monitoring Framework with Integrated Sensing Technologies for Enhanced Food Safety and Traceability, file a95d59b4-66d1-478d-a655-b9ef0bd37035
|
6
|
Towards conceptual analysis of Cyber-Physical Systems projects focusing on the composition of legacy systems, file 03ffd208-09e4-48de-85ac-b14596f327bb
|
5
|
A multi-criteria ranking of security countermeasures, file e398c37a-b461-179a-e053-3705fe0a4cff
|
5
|
A requirements-driven methodology for the proper selection and configuration of blockchains, file e398c381-12bc-179a-e053-3705fe0a4cff
|
5
|
MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems, file a43863d7-bbc0-4a33-9bda-f7ee3a176e67
|
4
|
Modelling and analysis of a scheduled maintenance system: a DSPN approach, file e398c378-cb8f-179a-e053-3705fe0a4cff
|
4
|
Modeling QoE in Dependable Tele-Immersive Applications: A Case Study of World Opera, file e398c380-f642-179a-e053-3705fe0a4cff
|
4
|
Basic concepts on Systems of Systems, file e398c37b-1d8a-179a-e053-3705fe0a4cff
|
2
|
PrivAPP: An integrated approach for the design of privacy-aware applications, file e398c37c-78a5-179a-e053-3705fe0a4cff
|
2
|
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d0d8-179a-e053-3705fe0a4cff
|
2
|
HUSTLE: A Hardware Unit for Self-Test-Libraries Efficient Execution, file 6e3eedb2-e614-478a-8cfe-b913412c4761
|
1
|
Towards a General Model for Intrusion Detection: An Exploratory Study, file 955e0aac-7aef-405c-9ccd-a6889831735a
|
1
|
An extension of the ADVISE Meta modeling framework and its application for an early-stage security analysis of a public transport supervision system, file a76e05e6-04e1-4b64-8716-9f5f746e95d8
|
1
|
Adding Security Concerns to Safety Critical Certification, file e398c378-82aa-179a-e053-3705fe0a4cff
|
1
|
Dependability Provisions for a Network Management Platform, file e398c378-b458-179a-e053-3705fe0a4cff
|
1
|
Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems, file e398c378-c038-179a-e053-3705fe0a4cff
|
1
|
Analysis of safety related architectures, file e398c378-c08f-179a-e053-3705fe0a4cff
|
1
|
A testing service for lifelong validation of dynamic SOA, file e398c378-c43b-179a-e053-3705fe0a4cff
|
1
|
Modelling and model-based assessment, file e398c378-c95b-179a-e053-3705fe0a4cff
|
1
|
Integrated Validation of Dependable Systems, file e398c378-cc0c-179a-e053-3705fe0a4cff
|
1
|
Consensus in asynchronous distributed systems, file e398c378-cc85-179a-e053-3705fe0a4cff
|
1
|
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b4-179a-e053-3705fe0a4cff
|
1
|
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b5-179a-e053-3705fe0a4cff
|
1
|
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock, file e398c379-587b-179a-e053-3705fe0a4cff
|
1
|
Safe Estimation of Time Uncertainty of Local Clocks, file e398c379-5f02-179a-e053-3705fe0a4cff
|
1
|
An Experimental Framework for the Analysis and Validation of Software Clocks, file e398c379-5f04-179a-e053-3705fe0a4cff
|
1
|
An OS-level Framework for Anomaly Detection in Complex Software Systems, file e398c37a-09f0-179a-e053-3705fe0a4cff
|
1
|
On the impact of emergent properties on SoS security, file e398c37a-8395-179a-e053-3705fe0a4cff
|
1
|
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c37a-84cb-179a-e053-3705fe0a4cff
|
1
|
Experimental assessment of low-cost GPS-based localization in railway worksite-like scenarios, file e398c37a-8b3e-179a-e053-3705fe0a4cff
|
1
|
Towards an analysis framework for cost & quality estimation of V&V projects, file e398c37d-034d-179a-e053-3705fe0a4cff
|
1
|
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results, file e398c37e-91a0-179a-e053-3705fe0a4cff
|
1
|
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c381-0028-179a-e053-3705fe0a4cff
|
1
|
Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?, file e398c381-d02d-179a-e053-3705fe0a4cff
|
1
|
Totale |
9.486 |