http://iet.metastore.ingenta.com
1887

8th IET International System Safety Conference incorporating the Cyber Security Conference 2013

Buy conference proceeding
$126.00
(plus tax if applicable)
  • Location: Cardiff, UK
  • Conference date: 16-17 Oct. 2013
  • ISBN: 978-1-84919-778-6
  • Conference number: CP620
  • The following topics are dealt with: system safety; cyber security; human factors in safety and security; standards and process safety issues; safety and security interactions; critical infrastructures and systems; validation and verification; risk assessment; internationalisation; security processes; and trust and embedded systems.

27 items found

  • Cyber security of intelligent buildings: a review
  • Certification of Autonomous Systems
  • Process safety and cyber security convergence: Lessons identified, but not learnt?
  • Technical review of common safety method using system for investigation of railway interfaces (SIRI) methodology
  • Assessment of PVST in Accordance with IEC 61508:2010
  • Practical Extensions of Safety Critical Engineering Processes for Securing Industrial Control Systems
  • Use of visual propositional calculus to derive safety critical functions
  • Cyber-security as an attribute of active safety systems and their migration towards vehicle automation
  • System Safety: Where Next?
  • Trustworthy cyber-physical systems - a review
  • Practical experiences of using formal requirements and their role in an overall work-flow
  • Protecting Critical National Infrastructure Through Collaborative Cyber Situational Awareness
  • The importance and impact of a good SRS - it's not just about the cause & effects
  • Towards a safety case for runtime risk and uncertainty management in safety-critical systems
  • One Approach to Functional Safety Assurance and Safety Lifecycle Compliance
  • Safety cases for use of smart devices in existing nuclear power stations - "getting the balance right"
  • Interpreting ALARP
  • A framework for specification of arming system safety functions
  • Reaching out to the world - international Engineering Safety Management (iESM)
  • Development Phase in Accordance with ISO 26262
  • Global safety culture, or strategic chains of co-operation?
  • Choosing controls to protect against targeted attacks. Application of the analytical threat intelligence
  • Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
  • Intrusion Tolerant System for Integrated Vetronics Survivability Strategy
  • The use of static analysis to detect malware in embedded systems
  • Is there a role for Apps in the future of Safety Management?
  • A method for parallel software refactoring for safety standards compliance
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address