Jamroziak, Krzysztof Joszko, Kamil Wolanski, Wojciech Gzik, Marek Burkacki, Michal Suchon, Slawomir Szarek, Arkadiusz Zielonka, Karol
Published in
Archives of Civil and Mechanical Engineering
Road traffic accidents involving coaches do not happen very often, but they are very dangerous because they affect a large number of passengers. Coaches (or intercity buses) are not equipped with safety belt harnesses. Valid regulations do not impose any obligation on coach manufacturers to provide intercity buses with either two- or three-point sa...
Benzekri, Abdelmalek Barbeau, Michel Gong, Guang Laborde, Romain Mansouri, Mohamad Bozdemir, Beyza Önen, Melek Ermis, Orhan Moussaileb, Routa Cuppens, Nora
...
Dahl, Mattias Javadi, Mohammad Saleh
open access
Reich, Jan Zeller, Marc Schneider, Daniel
Creating a sound argumentation of why a system is sufficiently safe is a major part of the assurance process. Today, compiling a safety case and maintaining its validity after changes are time-consuming manual work performed by safety experts based on their experience and knowledge. This work is further complicated when supplier components need to ...
Brahim, Hamid Barbara, Gallina Asaf, Shabtai Yuval, Elovici Garcia-Alfaro, Joaquin
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with th...
Vilela, Jéssyka Castro, Jaelson Martins, Luiz Eduardo Galvão Gorschek, Tony Almendra, Camilo
Context: Safety-critical systems (SCS) are mainly controlled by software. Accordingly, the development of these systems must be carefully planned since inadequate or misunderstood requirements have been recognized as the major cause of a significant proportion of accidents and safety-related catastrophes. Objective: We investigate the integration a...
Naccache, David Xu, Shouhuai Qing, Sihan Samarati, Pierangela Blanc, Gregory Lu, Rongxing Zhang, Zonghua Meddahi, Ahmed
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malwar...
Ahmed, Areeb Savacı, Ferit Acar
10th International Conference on Electrical and Electronics Engineering, ELECO 2017; Bursa; Turkey; 29 November 2017 through 2 December 2017 / Random Communication Systems (RCSs) given in the literature have assumed perfectly synchronized transmitter and receiver. However in this paper, instead of assuming perfect synchronization approach in RCSs, ...
Szymkowski, Maciej Saeed, Khalid
Biometrics helps protect users’ data against hackers. There are two groups of biometrics features, the first contains physiological features and the second consists of behavioral traits. In the case of biometrics safety procedure the user does not need to remember his/her password because they always have them. It is proved that physiological biome...
Jančič, Jakob