Refine Your Search

Topic

Author

Affiliation

Search Results

SAE MOBILUS Subscription

Wiley Cyber Security Collection Add-On

2018-03-23
As an annual subscription, the Wiley Cyber Security Collection Add-On is available for purchase along with one or both of the following: Wiley Aerospace Collection Wiley Automotive Collection The titles from the Wiley Cyber Security Collection are included in the SAE MOBILUS® eBook Package. Titles: Network Forensics Penetration Testing Essentials Security in Fixed and Wireless Networks, 2nd Edition The Network Security Test Lab: A Step-by-Step Guide Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition Computer Security Handbook, Set, 6th Edition Threat Modeling: Designing for Security Other available Wiley collections: Wiley SAE MOBILUS eBook Package Wiley Aerospace Collection Wiley Automotive Collection Wiley Computer Systems Collection Add-On (purchasable with the Wiley Aerospace Collection and/or the Wiley Automotive Collection)
Training / Education

Risk Management Throughout the Automotive Development Process Web Seminar RePlay

Anytime
Jon Quigley discusses the importance of this seminar. Automotive projects continue to grow in complexity. Studies provide a glimpse into the attributes of product development projects that have a high likelihood of failure. Knowing these attributes, the approach to the project can be structured to reduce the risks. For example, the scope of the project may already place the project at risk. Understanding the risks associated with the scope enables you to either reconsider the scope or work out strategies that will eliminate or at least mitigate the risks.
Technical Paper

Applicability of System Safety Processes and Operational Risk Management Training for Future Pilots

2001-09-11
2001-01-2636
System safety is taught as a discipline in some aeronautical programs. Such a course maybe designed to prepare career-minded aviation students with a solid background to face the technical intricacies of the commercial flight arena. Over the course of the past decade, the complexity of large modern transport category aircraft has grown, and along with that growth the command and control functions built into the avionics and flight control systems have become automatic. Most new pilots entering into the cockpits of these aircraft require an understanding of how to manage these new systems in light of the basic design principles used. One excellent method of providing education for students in aeronautical studies is through courses in system safety and operational risk management (ORM).
Technical Paper

New Safety Technologies for the Automotive Industry

2006-10-16
2006-21-0065
With the increasing complexity of automotive systems and the related increasing use of software in them, new approaches are needed to ensure safety. In these new types of automotive systems, safety and reliability are different and require different engineering approaches. Accidents are increasingly due to design errors and to dysfunctional interactions among components rather than component failure. In addition, safety must be engineered and built into the design from the beginning; it is not possible to effectively and affordably add safety devices onto a finished design. This paper describes the need for new approaches to automotive safety and describes an alternative to the traditional reliability-based approaches to safety engineering. The new approach is based on systems theory and views accidents in terms of lack of control or enforcement of the behavioral constraints required to ensure safety.
Technical Paper

Project Team Attributes for Risk Management in the Product Design Process

2007-11-28
2007-01-2688
The attributes of the project team play a fundamental role in the product development process (PDP), since they, have a significant influence on the conducting of activities, making of decisions and liaison with customers. The importance of the project team is also recognized in the management of the potential risks that can appear during the PDP, because risk management (RM) depends strongly on the company culture and the commitment of the project team involved. However, in general, the culture of a company is not pro-active in the sense of anticipating potential problems that may appear and generally the project team resists analyzing these potential problems for fear of exposing and consequently committing themselves. In this regard, this paper presents a brief introduction on product development and its importance and management. Subjects related to risk management, the product design process and the project team are then discussed.
Journal Article

A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems

2021-11-16
Abstract The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study (SMS) on the topic area “security countermeasures of in-vehicle communication systems.” A total of 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions (RQs) related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats and the whole mapping process.
Journal Article

From the Guantanamo Bay Crash to Objective Fatigue Hazard Identification in Air Transport

2020-10-19
Abstract Sleep quality and maintenance of the optimal cognitive functioning is of crucial importance for aviation safety. Fatigue Risk Management (FRM) enables the operator to achieve the objectives set in their safety and FRM policies. As in any other risk management cycle, the FRM value can be realized by deploying suitable tools that aid robust decision-making. For the purposes of our article, we focus on fatigue hazard identification to explore the possible developments forward through the enhancement of objective tools in air transport operators. To this end we compare subjective and objective tools that could be employed by an FRM system. Specifically, we focus on an exploratory survey on 120 pilots and the analysis of 250 fatigue reports that are compared with objective fatigue assessment based on the polysomnographic (PSG) and neurocognitive assessment of three experimental cases.
Technical Paper

New Half Shaft Bench Test Methodology for NVH Characterization

2019-06-05
2019-01-1558
The main purpose of this paper is to develop a reliable bench test to understand the vibratory behavior of the half shafts under applied torque comparable to an idle condition. In some cases, the half shaft path is a major factor influencing the idle vibration in the vehicle. At idle condition vehicle vibrations are caused by engine excitation and then they pass through different paths to the body structure. Half shaft manufacturers generally characterize shaft joints for their frictional behavior and typically there is no data for vibration characteristics of the half shaft under idle conditions. However, for predictive risk management, the vibratory behavior of the half shaft needs to be identified. This can be achieved from measured frequency response functions under preloaded test conditions.
Technical Paper

Ground Control- Using Fiber Optics to Reduce Electrical Ground Interaction

2019-03-19
2019-01-1381
The increase in the use of composite structures and components is revealing some contiguous consequences for the design of electrical systems: a) reduced electrical shielding and its effects on EMI compatibility, and b) the absence of electrical capacity from global electrical grounds. The first consequence can be mitigated by carefully following best practices for EMI compatibility, allowing for the weight and cost for shielding and other necessary components. The second consequence has been discovered in other industries. Supply and ground circuits must now be carefully planned and risk-analyzed because the power delivery circuits interact. Supply circuits are now more subject to voltage drops across supply and ground lines. Regulated supply voltage levels may interact; an unexpected dropout in one of several supplies can potentially affect all others.
Technical Paper

Toxicology Testing of Petroleum Products: The Basis for Managing and Communicating Hazards

1986-10-01
861595
This paper describes programs, established at Mobil Oil Corp., for assessing, managing, and communicating the hazards of petroleum products. Toxicological evaluations must be part of a systematic and integrated program of assessing hazards and risks for man. Test articles are chemically analyzed, and critical animal tests are followed up by mechanistic studies to identify active components and the causes of toxicity. A thorough program evaluates acute and sub-chronic toxicity, carcinogenicity, mutagenicity and reproductive hazards. New tests or modifications to standard tests are developed for the evaluation of complex hydrocarbon mixtures when standard procedures are inadequate. Results of toxicology testing and information on incidence of human exposure provide the basis for risk management decisions.
Technical Paper

The Coupling of Operational Safety and INFOSEC Assessments1

2001-09-11
2001-01-2641
This paper describes an approach to integrating security and safety analysis of an Air Traffic Service (ATS) using the security assessment as an additional input to the risk management process. This approach helps address potential problems in coordinating safety and security requirements such as: different system models used for safety and security; different documentation structures for the analyses and their results; and the practice of isolating safety and security requirements processes. What motivates this approach is the overlap between security and safety considerations in the identification of hazards and associated risk management strategies.
Standard

Technique for Suspect/Counterfeit EEE Parts Detection by Secondary Ion Mass Spectrometry (SIMS) Test Methods

2015-09-18
WIP
AS6171/13
The scope of this document is to define capabilities and limitations of SIMS as they pertain to Suspect/Counterfeit EEE part detection. Additionally, this document outlines requirements associated with the application of SIMS including: operator training, sample preparation, data interpretation, equipment maintenance, and reporting of data. The Test Laboratory shall be accredited to ISO/IEC 17025 to perform the SIMS Test Method as defined in this standard. The Test Laboratory shall indicate in the ISO/IEC 17025 scope statement the specific method being accredited to: Option 1: All AS6171/13 Test Methods, or Option 2: All AS6171/13 Test Methods except imaging and 3D imaging, or Option 3: All AS6171/13 Test Methods except depth profiling and 3D imaging. If SAE AS6171/13 is invoked in the contract, the base document, AS6171 General Requirements, shall also apply.
Standard

TECHNIQUES FOR SUSPECT/COUNTERFEIT EEE PARTS DETECTION BY RADIATED ELECTROMAGNETIC EMISSION (REME) ANALYSIS TEST METHODS

2016-05-16
WIP
AS6171/14
The intent of this document is to define the methodology for suspect/counterfeit parts inspection using REME Analysis. The purpose of REME Analysis for suspect counterfeit part inspection is to detect misrepresentation or tampering of a part. REME Analysis can also potentially detect unintentional damage to the part resulting from improper removal of the part from assemblies, exposure to electrostatic discharge, exposure to radiation outside of acceptable limits (ionizing or high-power electromagnetic), or degradation. Improper removal of part from assemblies may include, but is not limited to, prolonged elevated temperature exposure during desoldering operations or mechanical stresses during removal. Degradation may include, but is not limited to, prolonged burn-in/testing, exposure to out-of-specification environmental conditions, or use outside of expected electrical tolerances.
Standard

AS6171 TECHNIQUES FOR SUSPECT/COUNTERFEIT EEE PART PACKAGING DETECTION BY VARIOUS TEST METHODS

2016-02-03
WIP
AS6171/15
Non-conformance and now Suspect counterfeit packaging represents a hazard to electrostatic discharge (ESD) sensitive devices or components through cross contamination during transport and storage while generating high voltage discharges to ESD sensitive devices during in shipping, the inspection process, handling and manufacturing. Several aerospace related issues involve long-term storage supplier non-conformance with antistatic foams, antistatic bubble, antistatic pink poly, vacuum formed antistatic polymers, Type I moisture barrier bags and Type III static shielding bags have posed issues. The late John Kolyer, Ph.D. (Boeing, Ret.) and Ray Gompf, P.E., Ph.D. (NASA-KSC, Ret.) were advocates in the utilization of a formalized physical testing material qualification process. Today, however, prime contractors and CMs rely heavily upon a visual inspection process for ESD packaging materials.
Standard

Techniques for Suspect/Counterfeit EEE Parts Detection by Netlist Assurance Test Methods

2016-02-15
WIP
AS6171/16
Netlist Assurance Test Methods exist to assess microcircuit designs for maliciously added, removed, or modified functions detrimental to system operation. In the context of the Microcircuit fabrication design process, these methods will be used to analyze a computer aided design (CAD) representation of the microcircuit. The Netlist Assurance Test Methods discover vulnerabilities, undisclosed functions (e.g. "kill switch", paths to leak passwords, or triggers of malicious activity) and changes from the original specifications of the devices. These methods are intended to be used with standard verification methods that the implemented design has remained unchanged through the many transformations in the design flow.
Standard

Technique for Suspect/Counterfeit EEE Parts Detection by Laser Scanning Microscopy (LSM) and Confocal Laser Scanning Microscopy (CLSM) Test Methods

2015-12-17
WIP
AS6171/17
This document defines capabilities and limitations of LSM and CLSM as they pertain to suspect/counterfeit EEE part detection. Additionally, this document outlines requirements associated with the application of LSM and CLSM including: operator training, sample preparation, various imaging techniques, data interpretation, calibration, and reporting of test results. This test method is primarily directed to analyses performed in the visible to near infrared range (approximately 400nm to 1100nm). The Test Laboratory shall be accredited to ISO/IEC 17025 to perform the LSM and CLSM Test Methods as defined in this standard. The Test Laboratory shall indicate in the ISO/IEC 17025 Scope statement, the specific method being accredited to: Option 1: All AS6171/17 Test Methods, or Option 2: All AS6171/17 Test Methods except CLSM. If SAE AS6171/17 is invoked in the contract, the base document, AS6171 General Requirements shall also apply.
Standard

Techniques for Suspect/Counterfeit EEE Parts Detection by Thermomechanical Analysis (TMA) Test Methods

2016-12-09
WIP
AS6171/18
This test method provides the capabilities, limitations, and suggested possible applications of TMA as it pertains to detection of suspect/counterfeit EEE parts. Additionally, this document outlines requirements associated with the application of TMA including: equipment requirements, test sample requirements, methodology, control and calibration, data analysis, reporting, and qualification and certification.
Standard

Techniques for Suspect/Counterfeit EEE Parts Detection by Auger Electron Spectroscopy (AES) Test Method

2016-12-09
WIP
AS6171/19
This document defines capabilities and limitations of Auger Electron Spectroscopy (AES) as it pertains to detection of suspect/counterfeit EEE parts and suggests possible applications to these ends. Additionally, this document outlines requirements associated with the application of AES including: operator training and requirements; sample preparation; data interpretation and reporting of data.
X