2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) 2018
DOI: 10.1109/macs.2018.8628389
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Requirement Management Techniques for Safety Critical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Data trustworthiness becomes complicated when an infinite number of devices communicate concurrently to effect the desired data collection. Hardware hacks for safety-critical systems are even more critical to handle [148]. Lack of tamper resistance (intentional causing of malfunctions by users) in sensors and devices allows exploitation of physical access to system and vehicular products.…”
Section: Hardware Hacksmentioning
confidence: 99%
“…Data trustworthiness becomes complicated when an infinite number of devices communicate concurrently to effect the desired data collection. Hardware hacks for safety-critical systems are even more critical to handle [148]. Lack of tamper resistance (intentional causing of malfunctions by users) in sensors and devices allows exploitation of physical access to system and vehicular products.…”
Section: Hardware Hacksmentioning
confidence: 99%
“…Requirements volatility prediction is a part of RCM, which is one of the three parts of requirements management. Gillani M. [24] analysed the activities that should be performed and the techniques and tools used in RM for safety critical systems. However, the review is for RM in a specific domain, it is not specifically for ML methods and with a short time interval.…”
Section: Related Workmentioning
confidence: 99%
“…In WSN, QoS aims to fulfil the requirements for users and applications. Its standards vary from different application nature and requirements [21]. Thus it is a difficult task to define the QoS standards according to different requirements.…”
Section: G Qosmentioning
confidence: 99%