نتایج جستجو برای: security and safety
تعداد نتایج: 16874329 فیلتر نتایج به سال:
H igh-assurance systems are used in environments where failure can cause security breaches or even a loss of life [1]. Examples include avionics, weapon controls, intelligence gathering, and life-support systems. Before such a system can be deployed, there must exist convincing evidence that it can support critical safety as well as security properties. The avionics community has addressed the ...
OBJECTIVE Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. METHODS Safety, privacy, and security were evaluated during a one-month single...
After 9/11, new security duties were instituted at many U.S. air carriers and existing safety and security duties received increased emphasis. Concurrently, in-flight services were changed and in many cases, cabin crews were reduced. This article examines the post-9/11 conflict between passenger service and the timely performance of safety and security duties at 1 major U.S. air carrier. In-fli...
The digitalization of industrial control systems (ICS) raises several security threats that can endanger the safety of the critical infrastructures supervised by such systems. This paper presents an analysis method that enables the identification and ranking of risks leading to a safety issue, regardless of the origin of those risks: accidental or due to malevolence. This method relies on a mod...
This paper presents the development of a novel joint safety and security architecture for dependable embedded time-triggered systems. While fault-tolerance properties of time-triggered protocols have been very well studied, research on security aspects for time-triggered systems have hardly been covered. Therefore, we explore system design principles which efficiently realize security mechanism...
Use cases are widely used for functional requirements elicitation. However, security non-functional requirements are often neglected in this requirements analysis process. As systems become increasingly complex current means of analysis will probably prove ineffective. In the safety domain a variety of effective analysis techniques have emerged over many years. Since the safety and security dom...
there are many evident that people are more interested in walking in attractive urban spaces and inappropriate physical and psychological condition can reduce their presence in a remarkable amount. the current research investigates the influence of physical design and psychological elements and their criteria on selective physical activity and specifically walking in urban public spaces. howeve...
conclusions different factors affect resiliency improvements in medical emergency staff and consequently the quality of pre-hospital burn care. this study showed that various factors such as scene security/safety, effective decision making, self-efficacy and religious support are effective in the improvement of resiliency and the quality of pre-hospital emergency care. results by analyzing 456 ...
Nowadays, the field of embedded system experiences a number of changes. On one hand, recent cyber attacks against safety-critical systems demonstrate that malware can force safetycritical systems to endanger human lives and harm the environment. Therefore, a new requirement of security have arisen for safety-critical and embedded systems. However, security should be designed hand in hand with s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید