{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":432,"items":[{"DOI":"10.65391\/r3182","title":["Seminar Report - Can We Quantify Risk"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r1943","title":["Safety Assurance Objectives for Autonomous Systems"],"author":[{"name":"SASWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1744","title":["Introducing Autonomous Systems into Operations: How the SMS has to Change"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1325","title":["Chances, Confidence and Risks Analysis:The Chance of Covid-19 Infection in the Day Care of Very Young Children"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1332","title":["Challenges of Cyber-Resilience in Aviation:An Implementation"],"author":[{"given":"Lee","family":"Ramsay","sequence":"first","affiliation":[]},{"given":"Mick","family":"Warren","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3299","title":["A Brief Quest for Lesser-Spotted News Articles in Dependability"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r2935","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1937","title":["Breaking the Tyranny of Net Risk Metrics forAutomated Vehicle Safety"],"author":[{"given":"Philip","family":"Koopman","sequence":"first","affiliation":[]},{"given":"William","family":"Widen","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,13]]}},{"DOI":"10.65391\/r1081","title":["Functional Safety in the Context of Distributed Co-Simulation"],"author":[{"given":"Bernhard","family":"Winkler","sequence":"first","affiliation":[]},{"given":"Helmut","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Benedikt","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Krammer","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r1176","title":["Making Modular Assurance Cases Work Using Structured Assurance Case Metamodel(SACM)"],"author":[{"given":"Jane","family":"Fenn","sequence":"first","affiliation":[]},{"given":"Ran","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]},{"given":"Yvonne","family":"Oakshott","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3276","title":["Tech Trip Report - RAF Museum Midlands (Cosford)"],"author":[{"given":"Dave","family":"Banham","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r3348","title":["Putting importance into context - moving from the abstract to the concrete with IEC 63187"],"author":[{"given":"James","family":"Inge","sequence":"first","affiliation":[]},{"given":"Katia","family":"Potiron","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Machrouh","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1323","title":["TM Card: A way to provide a useful index for standards and guidelines for Autonomous Vehicles"],"author":[{"given":"Masao","family":"Ito","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1940","title":["Human Factors in Functional Safety Assessment"],"author":[{"given":"Jonathan","family":"Wiggins","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,13]]}},{"DOI":"10.65391\/r3272","title":["How Do I Get Into Safety"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Graham","family":"Jolliffe","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r3198","title":["Where next for complex software-based systems"],"author":[{"given":"Emma","family":"Taylor","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r1077","title":["Assuring EULYNX: Application of CSM-RA to Specification Development"],"author":[{"given":"David","family":"Shipman","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Bull","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r2993","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3308","title":["60 Seconds with \u2026 Tim Kelly"],"author":[{"given":"Tim","family":"Kelly","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r3150","title":["The Development of a Hybrid Nuclear Requirements Hierarchy (HNRH) and its Application to a Non-Specific Fusion Facility"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,1]]}},{"DOI":"10.65391\/r3288","title":["Risk Matrices and Pitfalls"],"author":[{"given":"Lucia","family":"Capogna","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Bull","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r3178","title":["Safe, Ethical &amp; Sustainable A Mantra for All Seasons"],"author":[{"given":"Joan","family":"Atkinson","sequence":"first","affiliation":[]},{"given":"John","family":"McDermid","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r1901","title":["Sanity Checking Autonomous Vehicle Specifications using ZDRa"],"author":[{"given":"Lavinia","family":"Burski","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3190","title":["Letters to the Editor"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r1747","title":["Hierarchical Approaches to Product Cyber Security: An Automotive Case Study"],"author":[{"given":"Aditya","family":"Deshpande","sequence":"first","affiliation":[]},{"given":"Robert","family":"Oates","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3349","title":["Agile Model-Based Development and Safety Assessment for Light UAVs"],"author":[{"given":"Bernhard","family":"Kaiser","sequence":"first","affiliation":[]},{"given":"R\u00fcdiger","family":"Diefenbach","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Paquet","sequence":"additional","affiliation":[]},{"given":"Petr","family":"Fomin","sequence":"additional","affiliation":[]},{"given":"Guilherme","family":"Goretkin","sequence":"additional","affiliation":[]},{"given":"John","family":"Vergere","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Neely","sequence":"additional","affiliation":[]},{"given":"John","family":"Macauley","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3121","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3229","title":["60 Seconds with\u2026 Harold Thimbleby"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r3262","title":["Seminar Report - Deployment, Operations and Maintenance of Safe AI Systems"],"author":[{"given":"Catherine","family":"Menon","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3203","title":["Seminar Report - Developing Safe AI Systems"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,10,10]]}},{"DOI":"10.65391\/r1534","title":["\u201cCowboy digital\u201d undermines safety-critical systems"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1245","title":["Assurance Case Guidance (Version 1)"],"author":[{"name":"ACWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r2995","title":["Guidance on the Through-Life Assurance of Complex Systems v1"],"author":[{"name":"SCSWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r138","title":["Data Safety Guidance (Version 3.0)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3251","title":["Risks caused by Electromagnetic Interference"],"author":[{"given":"Keith","family":"Armstrong","sequence":"first","affiliation":[]},{"given":"Davy","family":"Pissoort","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,10,1]]}},{"DOI":"10.65391\/r3307","title":["Seminar Report - Creating and Maintaining Effective Safety Culture"],"author":[{"given":"Rick","family":"Vinter","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r3224","title":["How Smart Are Our Motorways"],"author":[{"given":"John","family":"Ridgway","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r1908","title":["Ensuring Safety and Effectiveness of Medical Devices in the Presence of Electromagnetic Disturbances through Unified EMC Assurance: A Compliance Pattern"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]},{"given":"Dries","family":"Vanoost","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Catrysse","sequence":"additional","affiliation":[]},{"given":"Laure","family":"Buysse","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Kleihorst","sequence":"additional","affiliation":[]},{"given":"Vikas","family":"Ghatge","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1749","title":["An Overview of IEEE Std 1848-2020: Standard for Techniques and Measurement to Manage Functional Safety and Other Risks with Regards to Electromagnetic Disturbances"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]},{"given":"Keith","family":"Armstrong","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1929","title":["Safety Monitoring for Large Language Models: A Case Study of Offshore Wind Maintenance"],"author":[{"given":"Callum","family":"Rothon","sequence":"first","affiliation":[]},{"given":"Connor","family":"Walker","sequence":"additional","affiliation":[]},{"given":"Koorosh","family":"Aslansefat","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Dethlefs","sequence":"additional","affiliation":[]},{"given":"Yiannis","family":"Papadopoulos","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3283","title":["Seminar Report - The Future of Requirements for Safety Critical Systems"],"author":[{"given":"Bernard","family":"Twomey","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r1910","title":["Red Cars are Killing Left-handed People!"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1079","title":["Design of an Application to Make Maintenance Processes Safer"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r1871","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1521","title":["Data Safety Guidance (Version 3.4)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1540","title":["What do Byzantine Generals and Airbus Airliners Have in Common?"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3304","title":["Seminar Report - Data Safety Evolution"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r1166","title":["Assuring Safe Autonomy"],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r3278","title":["Data Safety Analysis using RADISH"],"author":[{"given":"Divya","family":"Atkins","sequence":"first","affiliation":[]},{"given":"Martin","family":"Atkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r1909","title":["System-Theoretic Process Analysis Approach to Analyse EMI-related Hazards and Prioritise Loss Scenarios"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]},{"given":"Dries","family":"Vanoost","sequence":"additional","affiliation":[]},{"given":"Miriam","family":"Gonzalez-Atienza","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Kleihorst","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3269","title":["Dealing With Covid-19 Where We Are"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r3363","title":["Book Review"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3164","title":["Let Me Make Myself Unclear"],"author":[{"given":"John","family":"Ridgway","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2017,4,1]]}},{"DOI":"10.65391\/r3255","title":["Tangling with the Entangled"],"author":[{"given":"Robert","family":"Oates","sequence":"first","affiliation":[]},{"given":"James","family":"Cruise","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3254","title":["Why do we need new standards for EMI Functional Safety Risks"],"author":[{"given":"Keith","family":"Armstrong","sequence":"first","affiliation":[]},{"given":"Davy","family":"Pissoort","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,10,1]]}},{"DOI":"10.65391\/r3184","title":["Is there something hidden in the code"],"author":[{"given":"Gavin","family":"Wilsher","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r3263","title":["60 Seconds with \u2026 John McDermid"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,31]]}},{"DOI":"10.65391\/r1422","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1709","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3128","title":["60 Seconds with \u2026 Graham Jolliffe"],"author":[{"given":"Graham","family":"Jolliffe","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r141","title":["Goal Structuring Notation Community Standard (Version 1)"],"author":[{"name":"GSN User Community WG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3366","title":["Seminar - Complying with the EU AI ACT"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3364","title":["60 Seconds with \u2026 Chris Hobbs"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r1725","title":["Case Study Analysis of STPA on an Industrial Cooperative Robot and an Autonomous Mobile Robot"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]},{"given":"Dries","family":"Vanoost","sequence":"additional","affiliation":[]},{"given":"Jens","family":"Vankeirsbilck","sequence":"additional","affiliation":[]},{"given":"Jeroen","family":"Boydens","sequence":"additional","affiliation":[]},{"given":"Laure","family":"Buysse","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Whiteley","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3096","title":["Assurance of AI and autonomous technology in complex environments: a human-centered perspective"],"author":[{"given":"Ibrahim","family":"Habli","sequence":"first","affiliation":[]},{"given":"Kate","family":"Preston","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Sujan","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1740","title":["Anticipating Accidents through Reasoned Simulation"],"author":[{"given":"Andrew","family":"Ireland","sequence":"first","affiliation":[]},{"given":"Craig","family":"Innes","sequence":"additional","affiliation":[]},{"given":"Subramanian","family":"Ramamoorthy","sequence":"additional","affiliation":[]},{"given":"Yuhui","family":"Lin","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1531","title":["Introducing a Restorative Just Culture and the Learning Review at the Docklands Light Railway"],"author":[{"given":"Adam","family":"Johns","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1074","title":["Towards Dynamic Safety Management for Autonomous Systems"],"author":[{"given":"Gereon","family":"Weiss","sequence":"first","affiliation":[]},{"given":"Mario","family":"Trapp","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r3206","title":["Environmental Hazard And Impact Identification"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,10,10]]}},{"DOI":"10.65391\/r1304","title":["What can be learned from the UK response to the Coronavirus using STAMP and how this learning could shape future responses &amp; policies"],"author":[{"given":"Simon","family":"Whiteley","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1061","title":["Service-based Safety Assurance: A provider approach in a challenging environment"],"author":[{"given":"Kevin","family":"King","sequence":"first","affiliation":[]},{"given":"Steve","family":"Elliott","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r1731","title":["Legal Liability for Safety Critical Systems"],"author":[{"given":"Dai","family":"Davis","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3082","title":["The Bigger Picture of Safety on Roads and the Impact of Autonomous Vehicles on the Implicit Safety Argument"],"author":[{"given":"Helen","family":"Monkhouse","sequence":"first","affiliation":[]},{"given":"Roger","family":"Rivett","sequence":"additional","affiliation":[]},{"given":"David","family":"Blackburn","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3346","title":["Complex Systems Guidance - Learning from Surprises"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3336","title":["AI and Safety Critical Systems"],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3343","title":["What\u2019s Your Context - Assuring GPAI in Safety-critical Settings"],"author":[{"given":"Shaun","family":"Feakins","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Habli","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Morgan","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1185","title":["Safety Critical Integrity Assurance in Large Datasets"],"author":[{"given":"Ali","family":"Hessami","sequence":"first","affiliation":[]},{"given":"Graham","family":"Sutherland","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r922","title":["Safety of Artificial Intelligence and its role in Autonomy: A Maritime Perspective"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Daffey","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r3236","title":["SSS\u201923 Event Report"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,5,1]]}},{"DOI":"10.65391\/r3312","title":["Product Owners \u2013 The key to Safe Agile"],"author":[{"given":"Bill","family":"Blackburn","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r3192","title":["AI Safety"],"author":[{"given":"Ibrahim","family":"Habli","sequence":"first","affiliation":[]},{"given":"John","family":"McDermid","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r3311","title":["Mixin Things Up!"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r3279","title":["Avoiding Safety and Cybersecurity Risks"],"author":[{"given":"Dhanabal","family":"Arunachalam","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r1190","title":["Generating the Evidence Necessary to Support Machine Learning Safety Claims"],"author":[{"given":"Chris","family":"Allsopp","sequence":"first","affiliation":[]},{"given":"James","family":"McCloskey","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Maguire","sequence":"additional","affiliation":[]},{"given":"Rose","family":"Gambon","sequence":"additional","affiliation":[]},{"given":"Thom","family":"Kirwan-Evans","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3234","title":["Seminar Report - New Safety Analysis Techniques"],"author":[{"given":"Richard","family":"Trebilcock","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r3230","title":["The Safety Futures Initiative"],"author":[{"given":"Zo\u00eb","family":"Garstang","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r1859","title":["Chasing the Black Swan"],"author":[{"given":"Malcolm","family":"Jones","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,9,1]]}},{"DOI":"10.65391\/r1324","title":["Digital Twins for Safety-Critical Systems: Principles to support their role in safety assurance"],"author":[{"given":"Kevin","family":"King","sequence":"first","affiliation":[]},{"given":"Mark","family":"Nicholson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1329","title":["Prediction of Dynamic Adaptation Techniquefor Autonomous Vehicles using Decision Trees"],"author":[{"given":"Anil","family":"Patel","sequence":"first","affiliation":[]},{"given":"Nikita","family":"Haupt","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Liggesmeyer","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3298","title":["If We Can\u2019t Define safe, What Chance Does AI Have"],"author":[{"given":"John","family":"Ridgway","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r1941","title":["Data Safety Guidance (Version 3.6)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1520","title":["Safety Assurance Objectives for Autonomous Systems V3"],"author":[{"name":"SASWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3102","title":["Security Informed Safety"],"author":[{"name":"SISWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1186","title":["Human Factors of Using Artificial Intelligence in Healthcare: Challenges That Stretch Across Industries"],"author":[{"given":"Dominic","family":"Furniss","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Habli","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Sujan","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1180","title":["Independent Co-Assurance using the Safety-Security Assurance Framework(SSAF):A Bayesian Belief Network Implementation for IEC 61508 and Common Criteria"],"author":[{"given":"Nikita","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Tim","family":"Kelly","sequence":"additional","affiliation":[]},{"given":"Youcef","family":"Gheraibia","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r920","title":["The State of Solutions for Autonomous Systems Safety"],"author":[{"given":"Andrew","family":"Banks","sequence":"first","affiliation":[]},{"given":"Rob","family":"Alexander","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Ashmore","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r1108","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1517","title":["Generic Assurance Topics for Any Type of Programmable Content"],"author":[{"given":"James","family":"Sharp","sequence":"first","affiliation":[]},{"given":"Rob","family":"Ashmore","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,1,28]]}},{"DOI":"10.65391\/r1386","title":["Goal Structuring Notation Community Standard (Version 3)"],"author":[{"name":"ACWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3166","title":["Structured Design of Safety Management"],"author":[{"given":"Steve","family":"Thomas","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2017,4,1]]}},{"DOI":"10.65391\/r1312","title":["Open Challenges and Gaps in the Guidance for the Use of Multi-Cores and MPSoCs in Safety-Critical Systems"],"author":[{"given":"Iain","family":"Bate","sequence":"first","affiliation":[]},{"given":"Louise","family":"Harney","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1072","title":["Verifying Behaviour of Swarms of Autonomous Cyber Physical Systems"],"author":[{"given":"Colin","family":"O'Halloran","sequence":"first","affiliation":[]},{"given":"Nick","family":"Tudor","sequence":"additional","affiliation":[]},{"given":"William","family":"Simmonds","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r1327","title":["Six Honest Serving Men for Today (Dialectic Argumentation for Assurance Cases)"],"author":[{"given":"Paul","family":"Chinneck","sequence":"first","affiliation":[]},{"given":"Yvonne","family":"Oakshott","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1188","title":["Issues with Rules for Autonomous Vehicle Safety"],"author":[{"given":"John","family":"Botham","sequence":"first","affiliation":[]},{"given":"Michael","family":"Ellims","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3093","title":["The challenges of assuring an eXtra Large Autonomous Underwater Vehicle"],"author":[{"given":"Kevin","family":"King","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Nair","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3316","title":["Flying Visits! An impromptu SCSC Tech Trip"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Dewi","family":"Daniels","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r1944","title":["Service Assurance Guidance Version 4"],"author":[{"name":"SAWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1889","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3126","title":["SSS\u201925 Event Report"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r3195","title":["Seminar Report - Safety Culture Developments"],"author":[{"given":"Rick","family":"Vinter","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r1170","title":["Satellite Navigation ~ Where Are We Going?"],"author":[{"given":"John","family":"Spriggs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1182","title":["IEC TR 63069, Security Environments and Security-Risk Analysis"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1736","title":["Grasping the Chalice \u2013 The Quest for the \"Holy Grail\" of Drone Operations"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1525","title":["Stories and narratives in safety engineering"],"author":[{"given":"Austen","family":"Rainer","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Menon","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3085","title":["Towards Verification of Learning-Based UAS Trajectory Generation in Uncertain Environments"],"author":[{"given":"Gareth","family":"Davies","sequence":"first","affiliation":[]},{"given":"Jaspal","family":"Sagoo","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r935","title":["Securing a wireless command and control system for the UK national rail network"],"author":[{"given":"Andrew","family":"Hawthorn","sequence":"first","affiliation":[]},{"given":"Richard","family":"Myers","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r3261","title":["The Sinking of the Unsinkable (again)"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3081","title":["A framework for fostering a strong Safety Culture"],"author":[{"given":"Paul","family":"Darnell","sequence":"first","affiliation":[]},{"given":"Ravindra","family":"Sabbella","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Bagalwadi","sequence":"additional","affiliation":[]},{"given":"Raghavendra","family":"Mithare","sequence":"additional","affiliation":[]},{"given":"Amrendra","family":"Kumar","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1530","title":["The German and Belgian Floods in July 2021"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3244","title":["Brexit and Software Safety"],"author":[{"given":"Dai","family":"Davis","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r1538","title":["Safety-critical Multi-core for Avionics"],"author":[{"given":"Gary","family":"Gilliland","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3247","title":["SSS\u201922 Event Report"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r1519","title":["\u2018til the Next Zero-Day Comes Ransomware, Countermeasures, and the Risks They Pose to Safety"],"author":[{"given":"Bruce","family":"Hunter","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,28]]}},{"DOI":"10.65391\/r3266","title":["Dark Data and Safety"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,31]]}},{"DOI":"10.65391\/r1075","title":["Review of the context for a combined security - safety risk management framework for rail"],"author":[{"given":"David","family":"Griffin","sequence":"first","affiliation":[]},{"given":"Emma","family":"Taylor","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r3282","title":["Safety Futures Initiative Introducing \u2026 Laure Buysse"],"author":[{"given":"Laure","family":"Buysse","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r1070","title":["Engineering Safe Machine Learning for Automated Driving Systems"],"author":[{"given":"Jelena","family":"Frtunikj","sequence":"first","affiliation":[]},{"given":"Simon","family":"F\u00fcrst","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r1539","title":["At the interface of engineering safety and cyber security"],"author":[{"given":"Reuben","family":"McDonald","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3253","title":["Human Factors Integration Technical Guide for Human Factors and Safety Management"],"author":[{"given":"David","family":"Pennie","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,10,1]]}},{"DOI":"10.65391\/r1751","title":["Resilience in Safety Critical Systems \u2013Offshore FRAM"],"author":[{"given":"David","family":"Slater","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3268","title":["Dark Data"],"author":[{"given":"David","family":"Hand","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,31]]}},{"DOI":"10.65391\/r1073","title":["Rethinking Diversity in the Context of Autonomous Systems"],"author":[{"given":"Bhopinder","family":"Madahar","sequence":"first","affiliation":[]},{"given":"Rob","family":"Ashmore","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r3271","title":["Seminar Report - Software Maintenance Legacy and Archaeology"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r1071","title":["Review of Regulatory Issues of Robotic and Autonomous Systems: Learning for Civil Nuclear Industry"],"author":[{"given":"Ben","family":"Pritchard","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Asgari","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Farrell","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r140","title":["Evolution of System Safety"],"published":{"date-parts":[[2018,2,3]]}},{"DOI":"10.65391\/r1107","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1169","title":["The Emergence of Accidental Autonomy"],"author":[{"given":"Alastair","family":"Faulkner","sequence":"first","affiliation":[]},{"given":"Mark","family":"Nicholson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3296","title":["Automotive AI Help or Hindrance"],"author":[{"given":"Helen","family":"Monkhouse","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r1352","title":["Service Assurance Guidance Version 2"],"author":[{"name":"SAWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3086","title":["Looking Beyond the Horizon"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3305","title":["Adapting to Changes in a Software Safety Assurance Approach"],"author":[{"given":"Mike","family":"Standish","sequence":"first","affiliation":[]},{"given":"Mark","family":"Hadley","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r3286","title":["60 Secs with \u2026 Les Hatton"],"author":[{"given":"Les","family":"Hatton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r1760","title":["Service Assurance Guidance Version 3.1"],"author":[{"name":"SAWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1729","title":["Build, monitor, and measure your live safety case in nLoop"],"author":[{"given":"Carmen","family":"C\u00e2rlan","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3372","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1743","title":["Safe, Ethical and Sustainable: Framing the Argument"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]},{"given":"Simon","family":"Burton","sequence":"additional","affiliation":[]},{"given":"Zo\u00eb","family":"Porter","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1934","title":["Anatomy of a Robotaxi Crash: Lessons from the Cruise Pedestrian Dragging Mishap"],"author":[{"given":"Philip","family":"Koopman","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,9]]}},{"DOI":"10.65391\/r3175","title":["The SCSC and the Internet"],"author":[{"given":"Brian","family":"Jepson","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r3210","title":["On the Safest Way to Kill"],"author":[{"given":"John","family":"Ridgway","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,1,1]]}},{"DOI":"10.65391\/r1054","title":["Automation Surprise in the 21st Century: Culture, Collaborative Cognition, Complexity and Legacy Systems"],"author":[{"given":"Sidney","family":"Dekker","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r1498","title":["Safer Systems: The Next 30 Years"],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3344","title":["AI-assisted HAZOP - Can prompt engineering deliver a credible HAZOP assessment"],"author":[{"given":"Thomas","family":"Wilkinson","sequence":"first","affiliation":[]},{"given":"Luke","family":"Hankins","sequence":"additional","affiliation":[]},{"given":"Mathew","family":"Wylie","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Fulford","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3275","title":["Assessment of Change Safety Cases"],"author":[{"given":"Stephen","family":"Barker","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r3181","title":["The Future of Human Factors"],"author":[{"given":"John","family":"Ridgway","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r3180","title":["The Future of Safety Engineering &amp; Assurance"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r936","title":["Data in Police and Criminal Justice Systems: How data errors could lead to harm to innocent citizens"],"author":[{"given":"Bill","family":"Blackburn","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Hampton","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r1724","title":["Making the safety standards work for you"],"author":[{"given":"Lucia","family":"Capogna","sequence":"first","affiliation":[]},{"given":"Rob","family":"Davies","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Bull","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Gill","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3144","title":["Functional Safety and Oracular Subsystems"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,8,13]]}},{"DOI":"10.65391\/r3221","title":["Formalising Communication On Potentially Catastrophic Safety Projects"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r3287","title":["Safety Future Initiative"],"author":[{"given":"Zo\u00eb","family":"Garstang","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r3220","title":["60 Secs with \u2026 Davy Pissoort"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,10,12]]}},{"DOI":"10.65391\/r3267","title":["The Safety of Autonomous Systems"],"author":[{"given":"Rob","family":"Alexander","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,31]]}},{"DOI":"10.65391\/r3310","title":["60 Secs with \u2026 Nancy Leveson"],"author":[{"given":"Nancy","family":"Leveson","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r1053","title":["Engineering Safe Autonomy"],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r930","title":["Error Management combining people and systems"],"author":[{"given":"Ludmila","family":"Musalova","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Rebecca","family":"Canham","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r1322","title":["Safety Culture Stories: News from the Front"],"author":[{"given":"Patrick","family":"Hudson","sequence":"first","affiliation":[]},{"given":"Timothy","family":"Hudson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3252","title":["Hardware and Software Techniques and Measures to Effectively Manage EMI Functional Safety Risks"],"author":[{"given":"Keith","family":"Armstrong","sequence":"first","affiliation":[]},{"given":"Davy","family":"Pissoort","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,10,1]]}},{"DOI":"10.65391\/r1060","title":["The Principles of Service Assurance"],"author":[{"given":"Alan","family":"Simpson","sequence":"first","affiliation":[]},{"given":"Andy","family":"Scott","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Durston","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r3201","title":["60 Secs with \u2026 Nick Hales"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,10,10]]}},{"DOI":"10.65391\/r1741","title":["Making the Water Visible: A methodology for exploring Systemic Change"],"author":[{"given":"Gill","family":"Kernick","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1921","title":["Implementing autonomy in nuclear robotics: an experience-informed review of applying SACE"],"author":[{"given":"Guy","family":"Burroughes","sequence":"first","affiliation":[]},{"given":"Lacey-Jo","family":"Marsland","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Osborne","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Mulvana","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Boden","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3218","title":["Reflections on Ada Lovelace Day"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,10,12]]}},{"DOI":"10.65391\/r3163","title":["Conforming to IEC 61511 Operation and Maintenance Requirements"],"author":[{"given":"Steve","family":"Gandy","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2017,4,1]]}},{"DOI":"10.65391\/r921","title":["Ethics and the safety of autonomous systems"],"author":[{"given":"Catherine","family":"Menon","sequence":"first","affiliation":[]},{"given":"Rob","family":"Alexander","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r3242","title":["Innovative Hydraulics and Automation Lab"],"author":[{"given":"Aim\u00e9e","family":"de Koning","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,5,1]]}},{"DOI":"10.65391\/r1931","title":["A Position Paper on Safety Culture Assessment and Improvement"],"author":[{"given":"Michael","family":"Wright","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3099","title":["The Post Office Horizon Scandal: Ensuring nothing like it ever happens again"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]},{"given":"Martyn","family":"Thomas","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1723","title":["What the first 100 years of the railways can teach us about the first 10 years of self-driving road vehicles"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]},{"given":"Roger","family":"Rivett","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Anderson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1528","title":["Towards a robust safety assurance process for maritime autonomous surface ships"],"author":[{"given":"Dracos","family":"Vassalos","sequence":"first","affiliation":[]},{"given":"Evangelos","family":"Boulougouris","sequence":"additional","affiliation":[]},{"given":"Gerasimos","family":"Theotokatos","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Bolbot","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r927","title":["The Fumble Programmer"],"author":[{"given":"Roderick","family":"Chapman","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r3156","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1614","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3277","title":["Applying the Layered Enterprise Data Safety Model"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r1732","title":["Challenges in Safety Mitigation and Assurance of Multi-agent Complex Systems"],"author":[{"given":"Alastair","family":"Faulkner","sequence":"first","affiliation":[]},{"given":"Mark","family":"Nicholson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3365","title":["Seminar - New Developments in Rail Safety Systems"],"author":[{"given":"Roger","family":"Rivett","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r1302","title":["Systems and Covid-19"],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1645","title":["IEC 61508 Viewpoint on System Safety in the Transport Sector"],"author":[{"given":"Derek","family":"Fowler","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,7,28]]}},{"DOI":"10.65391\/r926","title":["Service-Based Safety Assurance"],"author":[{"given":"Alan","family":"Simpson","sequence":"first","affiliation":[]},{"given":"Craig","family":"Harris","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r1173","title":["A Service Perspective on Accidents"],"author":[{"given":"Kevin","family":"King","sequence":"first","affiliation":[]},{"given":"Mark","family":"Sujan","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3215","title":["The Data Risk Zoo"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,10,12]]}},{"DOI":"10.65391\/r1518","title":["Software Reliability and the Misuse of Statistics"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]},{"given":"Nick","family":"Tudor","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,1,28]]}},{"DOI":"10.65391\/r3274","title":["Assurance Case WG \u2013 Guidance document and GSN Standard update"],"author":[{"given":"Phil","family":"Williams","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r1939","title":["The Open Autonomy Safety Case Framework"],"author":[{"given":"Carmen","family":"C\u00e2rlan","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wagner","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,13]]}},{"DOI":"10.65391\/r3200","title":["The SCSC is its Own Boss!"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r1078","title":["Forensics to Prognostics: From investigating failures to anticipating the vulnerabilities of increasingly complex systems"],"author":[{"given":"Graham","family":"Braithwaite","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r3292","title":["Space Weather Risks, Challenges and Solutions"],"author":[{"given":"Jonathan","family":"Eastwood","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r3186","title":["60 Secs with \u2026 Carmen Carlan"],"author":[{"given":"Carmen","family":"C\u00e2rlan","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r1927","title":["How do we make the case for \u201cSafe\u201d software and AI systems? - the Horizon Example"],"author":[{"given":"David","family":"Slater","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1334","title":["Influencing for Safety and Risk:A Novel Toolkit"],"author":[{"given":"Emma","family":"Taylor","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1748","title":["Dragons, Enigmas, Treasure Islands and Zombies: An Iconography of Risks Related to Dead Data"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]},{"given":"Paul","family":"Hampton","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1333","title":["Developing Leading Safety Indicators using the Functional Resonance Analysis Method"],"author":[{"given":"Anthony","family":"Finkelstein","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Costantino","sequence":"additional","affiliation":[]},{"given":"John","family":"Watt","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Villani","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Sujan","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Patriarca","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3303","title":["Data, Data Everywhere ..."],"author":[{"given":"Alastair","family":"Faulkner","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r1086","title":["Data Safety Guidance (Version 3.1)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3339","title":["Effective and reflective assurance for AI-based autonomy"],"author":[{"given":"Simon","family":"Burton","sequence":"first","affiliation":[]},{"given":"Jie","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Sepeedeh","family":"Roudposhti","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1330","title":["Human reliability assessment procedure fornon-Human Factors practitioners"],"author":[{"given":"David","family":"Pennie","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3145","title":["System Analysis on Driver Monitoring System for Mainline Railway"],"author":[{"given":"Niki","family":"Mok","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,8,13]]}},{"DOI":"10.65391\/r3280","title":["60 Secs with \u2026 Phil Koopman"],"author":[{"given":"Philip","family":"Koopman","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,1]]}},{"DOI":"10.65391\/r2972","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1179","title":["Utilising MBSE for Safety Assurance of COTS devices with embedded software"],"author":[{"given":"Waleed","family":"Chaudhry","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1646","title":["The Layered Enterprise Data Safety Model (LEDSM)"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,7,28]]}},{"DOI":"10.65391\/r3265","title":["Mistakes and Misconceptions"],"author":[{"given":"John","family":"Spriggs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,31]]}},{"DOI":"10.65391\/r3213","title":["Tech Trip Report National Space Centre"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,10,12]]}},{"DOI":"10.65391\/r3243","title":["Autonomous Driving \u2013 more than just avoiding collisions"],"author":[{"given":"Roger","family":"Rivett","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r3090","title":["Characteristics of Complex Systems"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r931","title":["A method for quantitative measurement of safety culture based on ISO 26262"],"author":[{"given":"Arash","family":"Saberi","sequence":"first","affiliation":[]},{"given":"Frank","family":"Benders","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Lukkien","sequence":"additional","affiliation":[]},{"given":"Mark","family":"van den Brand","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Koch","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r1755","title":["The Boeing 737 MAX 8 Crashes"],"author":[{"given":"Sanjeev","family":"Appicharla","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,1,28]]}},{"DOI":"10.65391\/r3317","title":["The Lean (but not mean) Learning Machine"],"author":[{"given":"Paul","family":"Lister","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r3209","title":["Autonomy\u2019s Troubling Questions"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,1,1]]}},{"DOI":"10.65391\/r133","title":["Data Safety Guidance  (Version 2.0)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3359","title":["Enhancing Sensitivity Analysis in a Safety Case Argument"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]},{"given":"Jeff","family":"Joyce","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Lapenna","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2026,1,31]]}},{"DOI":"10.65391\/r1913","title":["Driving the Development Process from the Safety Case"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]},{"given":"Jeff","family":"Joyce","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Diemert","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1445","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3293","title":["Managing Unexpected Risks"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Martin","family":"Atkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r1858","title":["An IEC 61508 Viewpoint on the Safety Assessment of Railway Control Systems"],"author":[{"given":"Alasdair","family":"Graebner","sequence":"first","affiliation":[]},{"given":"Derek","family":"Fowler","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,9,1]]}},{"DOI":"10.65391\/r3207","title":["Women in Engineering Reflections"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,10,10]]}},{"DOI":"10.65391\/r1082","title":["Towards a Safety Argument for Autonomous Systems that Use Machine Learning"],"author":[{"given":"Chris","family":"Allsopp","sequence":"first","affiliation":[]},{"given":"David","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Lennon","sequence":"additional","affiliation":[]},{"given":"James","family":"McCloskey","sequence":"additional","affiliation":[]},{"given":"Lee","family":"Ramsay","sequence":"additional","affiliation":[]},{"given":"Sam","family":"Jenkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r1303","title":["IPnet Vulnerabilities: A Case Study"],"author":[{"given":"Arlen","family":"Baker","sequence":"first","affiliation":[]},{"given":"Paul","family":"Parkinson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r939","title":["The Agile FMEA Approach"],"author":[{"given":"Are","family":"Hellandsvik","sequence":"first","affiliation":[]},{"given":"Geir","family":"Hanssen","sequence":"additional","affiliation":[]},{"given":"Jan-Arne","family":"Eriksen","sequence":"additional","affiliation":[]},{"given":"Thor","family":"Myklebust","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r3345","title":["Modelling the Requirements of a Medical Device in Kapture and Simulink"],"author":[{"given":"Joe","family":"Hare","sequence":"first","affiliation":[]},{"given":"Leo","family":"Freitas","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Pierce","sequence":"additional","affiliation":[]},{"given":"Callum","family":"Robinson","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Degenaar","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3208","title":["Data Safety Guidance for Clinical Risk Management"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Mark","family":"Thomas","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,1,1]]}},{"DOI":"10.65391\/r1887","title":["A position paper for assessing and managing safety culture"],"author":[{"name":"SCWG","sequence":"additional","affiliation":[]}]},{"DOI":"10.65391\/r3351","title":["Preliminary Findings of Practitioner\u2019s Perspectives on AI Adoption in Engineering Processes - An Exploratory Study in Engineering Practices"],"author":[{"given":"Meaghan","family":"O\u2019Neil","sequence":"first","affiliation":[]},{"given":"Russell","family":"Lock","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Baker","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Watson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3238","title":["The Future of Testing for Safety Critical Systems"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,5,1]]}},{"DOI":"10.65391\/r1912","title":["The Safety Case as a Process Driver"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1746","title":["Rising to the challenge of certifying automated vehicles"],"author":[{"given":"Jamie","family":"McFadden","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1076","title":["Developing Critical Software in the Modern Threat Environment"],"author":[{"given":"Andrea","family":"Margheri","sequence":"first","affiliation":[]},{"given":"Brian","family":"Stevens","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Ashmore","sequence":"additional","affiliation":[]},{"given":"Vladimiro","family":"Sassone","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,6]]}},{"DOI":"10.65391\/r3127","title":["Management of Change in an Ever-Changing World"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r3225","title":["60 Seconds with\u2026 Professor Erik Hollnagel"],"author":[{"given":"Erik","family":"Hollnagel","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r933","title":["Hazard and Risk Analysis of Health Informatics: Fundamental Challenges and New Directions"],"author":[{"given":"Ibrahim","family":"Habli","sequence":"first","affiliation":[]},{"given":"Sean","family":"White","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r3183","title":["Safety Futures Initiative Update"],"author":[{"given":"Zo\u00eb","family":"Garstang","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r3211","title":["The Relationship Between Employee Well-Being and Safety-Related Outcomes"],"author":[{"given":"Ludmila","family":"Musalova","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,1,1]]}},{"DOI":"10.65391\/r3337","title":["Quantifying the quantised \u2013 the interface of quantum technology and safety"],"author":[{"given":"James","family":"Cruise","sequence":"first","affiliation":[]},{"given":"Darendra","family":"Appanah","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Oates","sequence":"additional","affiliation":[]},{"given":"Walden","family":"Killick","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3223","title":["Complex Safety Cases \u2013 Enhancing The Goal Structuring Notation"],"author":[{"given":"Andrew","family":"King","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r3001","title":["Data Safety Guidance (Version 3.7)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3092","title":["An Agile Approach to Safety Cases for Autonomous Systems through Model-Based Engineering and Simulation"],"author":[{"given":"Bernhard","family":"Kaiser","sequence":"first","affiliation":[]},{"given":"Michael","family":"Soden","sequence":"additional","affiliation":[]},{"given":"R\u00fcdiger","family":"Diefenbach","sequence":"additional","affiliation":[]},{"given":"Eckhardt","family":"Holz","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1537","title":["Formal verification of railway interlocking and its safety case"],"author":[{"given":"Alexander","family":"Romanovsky","sequence":"first","affiliation":[]},{"given":"Alexei","family":"Iliasov","sequence":"additional","affiliation":[]},{"given":"Dominic","family":"Taylor","sequence":"additional","affiliation":[]},{"given":"Linas","family":"Laibinis","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3297","title":["Seminar Report - How to write Compelling Safety Arguments"],"author":[{"given":"Christine","family":"Harper","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r3295","title":["60 Secs with \u2026 ChatGPT"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r3165","title":["Assessing Safety Culture - Where do I start"],"author":[{"given":"Vicky","family":"Gliddon","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2017,4,1]]}},{"DOI":"10.65391\/r3245","title":["Wendy Owen\u2019s SSS\u201922 Speech"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r3240","title":["60 Secs with \u2026 Jane Fenn"],"author":[{"given":"Jane","family":"Fenn","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,5,1]]}},{"DOI":"10.65391\/r3241","title":["International Women in Engineering Day (INWED)"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,5,1]]}},{"DOI":"10.65391\/r919","title":["Safe Self-Driving Cars: Challenges and Some Solutions"],"author":[{"given":"Jonas","family":"Nilsson","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r1083","title":["Potential Methods to Enhance Safety within Neural Network Based Systems"],"author":[{"given":"Ali","family":"Hessami","sequence":"first","affiliation":[]},{"given":"Graham","family":"Sutherland","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r3222","title":["How Reliable are Pandemic Models"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r1336","title":["Safe staffing levels:latest Energy Institute guidance"],"author":[{"given":"Michael","family":"Wright","sequence":"first","affiliation":[]},{"given":"Stuart","family":"King","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3354","title":["COTS computer-based devices - Qualification or safety justification needs in the nuclear industry"],"author":[{"given":"Olivier","family":"Rousse","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r143","title":["Safety-Related Challenges for Autonomous Systems"],"author":[{"name":"SASWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3306","title":["Assurance challenges for Artificial Intelligence and Machine Learning in healthcare"],"author":[{"given":"Shakir","family":"Laher","sequence":"first","affiliation":[]},{"given":"Mark","family":"Sujan","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r3177","title":["View From The Desk \u2013 30 years of the SCSC"],"author":[{"given":"Tom","family":"Anderson","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r923","title":["Machine Learning Safety: An Overview"],"author":[{"given":"Jos\u00e9","family":"Faria","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r928","title":["The Future of MISRA C under the Spotlight"],"author":[{"given":"Frank","family":"van den Beuken","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r934","title":["Cyber security enhancements for an ARINC 653 safety-critical avionics platform"],"author":[{"given":"Arlen","family":"Baker","sequence":"first","affiliation":[]},{"given":"Paul","family":"Parkinson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r1737","title":["How Nuclear New Builds Incorporate Lessons Learned"],"author":[{"given":"Tom","family":"Hughes","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1526","title":["Development of Rechargeable Electrical Energy Storage Systems for Automotive and Aviation"],"author":[{"given":"Paul","family":"Darnell","sequence":"first","affiliation":[]},{"given":"Pavan","family":"Kumar","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1504","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r127","title":["Data Safety Guidance (Version 1.0)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1757","title":["The Terminological Analysis Method SemAn and its Implementation"],"author":[{"given":"Dieter","family":"Schn\u00e4pp","sequence":"first","affiliation":[]},{"given":"Lou","family":"Xinxin","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Ladkin","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,1,28]]}},{"DOI":"10.65391\/r3179","title":["Seminar Report - Safe Use of Multicore"],"author":[{"given":"Lee","family":"Jacques","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r3197","title":["Cyber Security Aspects of Autonomy in Aircraft"],"author":[{"given":"Mick","family":"Warren","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r3095","title":["Identifying Ethical Hazards in Safety-Critical Systems: The Role of Creativity"],"author":[{"given":"Austen","family":"Rainer","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Menon","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1536","title":["A Pipeline of Problems, or Software Development Nirvana? The Challenges of Adopting DevSecOps in a Safety-Critical Environment"],"author":[{"given":"James","family":"Sharp","sequence":"first","affiliation":[]},{"given":"Mike","family":"Drennan","sequence":"additional","affiliation":[]},{"given":"Paul","family":"McKernan","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1316","title":["A Longitudinal Study in Medical Error:The Limits of Lists"],"author":[{"given":"Michael","family":"Ellims","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1204","title":["Safety Assurance Objectives for Autonomous Systems V2"],"author":[{"name":"SASWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1830","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1735","title":["Architecting Safer Autonomous Aviation Systems"],"author":[{"given":"Ganesh","family":"Pai","sequence":"first","affiliation":[]},{"given":"Jane","family":"Fenn","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Nicholson","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Wilkinson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1313","title":["Assurance 2.0: A Manifesto"],"author":[{"given":"John","family":"Rushby","sequence":"first","affiliation":[]},{"given":"Robin","family":"Bloomfield","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3097","title":["Specifying Safety Requirements for Machine Learning Components in Autonomous Systems: A Survey"],"author":[{"given":"Richard","family":"Hawkins","sequence":"first","affiliation":[]},{"given":"Sepeedeh","family":"Shahbeigi","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1080","title":["Civil Certification of Multi-core Processing Systems in Commercial Avionics"],"author":[{"given":"David","family":"Radack","sequence":"first","affiliation":[]},{"suffix":"Jr.","given":"Harold","family":"Tiedeman","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Parkinson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r1647","title":["Evaluating Software Execution as a Bernoulli Process"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,7,28]]}},{"DOI":"10.65391\/r3314","title":["Seminar Report: How Safety Culture has to Change with AI"],"author":[{"given":"Catherine","family":"Menon","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r3084","title":["Automated Identification of Safety-Critical Attacks against CPS and Generation of Assurance Case Fragments"],"author":[{"given":"Sofia","family":"Guerra","sequence":"first","affiliation":[]},{"given":"Luca","family":"Castiglione","sequence":"additional","affiliation":[]},{"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3233","title":["Seminar Report - Management and Oversight of Complex Systems"],"author":[{"given":"Andy","family":"Williams","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r1326","title":["A Simple Calculus of Confidence"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3355","title":["Exploring the Role of Large Language Models in the Development of Safety Concepts"],"author":[{"given":"Anne","family":"Seldon","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1315","title":["Assuring the Integration of Autonomy:A Fault Taxonomy"],"author":[{"given":"Chris","family":"Allsopp","sequence":"first","affiliation":[]},{"given":"J","family":"Calford","sequence":"additional","affiliation":[]},{"given":"J","family":"Smith","sequence":"additional","affiliation":[]},{"given":"K","family":"Eder","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Maguire","sequence":"additional","affiliation":[]},{"given":"Rose","family":"Gambon","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1523","title":["Does an agile approach improve the way we derive RAMS requirements?"],"author":[{"given":"Gavin","family":"Wilsher","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1057","title":["Managing major accident hazard risks (people, plant and environment) during organisational change: A new Energy Institute Guide"],"author":[{"given":"Ludmila","family":"Musalova","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Rebecca","family":"Canham","sequence":"additional","affiliation":[]},{"given":"Stuart","family":"King","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r1308","title":["The Impact of \u00dcber-Authorities on WCET"],"author":[{"given":"Dave","family":"Banham","sequence":"first","affiliation":[]},{"given":"Michael","family":"Brown","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1314","title":["An Initial Framework Assessing the Safety of Complex Systems"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]},{"given":"Philip","family":"Garnett","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Weaver","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Burton","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r1527","title":["Ethics and Safety for Connected and Automated Vehicles"],"author":[{"given":"Paula","family":"Palade","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3315","title":["Seminar Report: Safe Agile Developments"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,10,16]]}},{"DOI":"10.65391\/r3340","title":["Towards Dynamic Safety Cases for Cobots - Leveraging Standards, Indicators, and Digital Twins"],"author":[{"given":"Laure","family":"Buysse","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Tloul","sequence":"additional","affiliation":[]},{"given":"Dries","family":"Vanoost","sequence":"additional","affiliation":[]},{"given":"Davy","family":"Pissoort","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1059","title":["Safety in NHS IT - A Personal Narrative"],"author":[{"given":"Maureen","family":"Baker","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r3204","title":["Ensuring computer reliability after the Post Office Horizon Scandal"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,10,10]]}},{"DOI":"10.65391\/r3357","title":["A framework to update the Common Law presumption that computer evidence is reliable"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1168","title":["The Boeing 737 MAX Accidents"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1309","title":["Meerkat \u2013 IoT-Based Solar-Powered SIL2 Footpath Level Crossing Warning System"],"author":[{"given":"Adrian","family":"Jones","sequence":"first","affiliation":[]},{"given":"Ian","family":"Burgoyne","sequence":"additional","affiliation":[]},{"given":"James","family":"Edwards","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Barrington","sequence":"additional","affiliation":[]},{"given":"Wendy","family":"Owen","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3187","title":["SSS\u201924 Event Report"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r3300","title":["Seminar Report - What Makes Good Evidence for a Safety Case"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r1756","title":["Safety Assessment of Point Merge Operations in Terminal Airspace"],"author":[{"given":"Derek","family":"Fowler","sequence":"first","affiliation":[]},{"given":"Octavian","family":"Fota","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,1,28]]}},{"DOI":"10.65391\/r1058","title":["Sufficient Assurance?"],"author":[{"given":"John","family":"Spriggs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r1522","title":["Consumerism, Contradictions, Counterfactuals: Shaping the Evolution of Safety Engineering"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Zo\u00eb","family":"Porter","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3089","title":["Bridging risk paradigms from cyber threats to safety impacts: a new assessment process"],"author":[{"given":"Benjamin","family":"Fulford","sequence":"first","affiliation":[]},{"given":"Mathew","family":"Wylie","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Stiff","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3367","title":["Safety By Design - Reflections from an Early-Career Engineer"],"author":[{"given":"Beatriz","family":"Coutinho","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3368","title":["Joining The Dots"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3370","title":["Maritime Autonomy \u2013 A Way Ahead"],"author":[{"given":"Nick","family":"Tudor","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3100","title":["Extending the State of the Art for the use of Formal Methods in Nuclear Control Systems"],"author":[{"given":"Colin","family":"O'Halloran","sequence":"first","affiliation":[]},{"given":"N.","family":"Moffat","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Tudor","sequence":"additional","affiliation":[]},{"given":"William","family":"Simmonds","sequence":"additional","affiliation":[]},{"given":"Callum","family":"Robinson","sequence":"additional","affiliation":[]},{"given":"Hannah","family":"Saunders","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Stephenson","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Teasedale","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1178","title":["Demystifying Functional Safety in Road Vehicles \u2013 ISO 26262"],"author":[{"given":"Rajiv","family":"Bongirwar","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1189","title":["Safety Systems and Defence in Depth in Nuclear New Build"],"author":[{"given":"Alastair","family":"Crawford","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r937","title":["A Systems Engineering Approach to Data Risk"],"author":[{"given":"Louise","family":"Harney","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r1218","title":["Data Safety Guidance (Version 3.2)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1124","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3232","title":["Assurance of Digital Twins for Safety-Critical Systems"],"author":[{"given":"Kevin","family":"King","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r1533","title":["Thirty years of learning by accident"],"author":[{"given":"Graham","family":"Braithwaite","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3289","title":["Data Risk Cygnology"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r3196","title":["60 Seconds with \u2026 John Spriggs"],"author":[{"given":"John","family":"Spriggs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r1745","title":["The Language of Risks and the Risks of Language"],"author":[{"given":"Austen","family":"Rainer","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Menon","sequence":"additional","affiliation":[]},{"given":"Lorna","family":"Gibb","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1938","title":["Principles of Conceptual Analysis forElectrotechnical Terminology (ConcAn)"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,13]]}},{"DOI":"10.65391\/r1742","title":["Machine safety conformance limitations for highly automated and autonomous heavy-duty mobile machinery"],"author":[{"given":"Aim\u00e9e","family":"de Koning","sequence":"first","affiliation":[]},{"given":"Reza","family":"Ghabcheloo","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1174","title":["Modular Safety Cases for the Assurance of Industry 4.0"],"author":[{"given":"Ibrahim","family":"Habli","sequence":"first","affiliation":[]},{"given":"Irfan","family":"Sljivo","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Jaradat","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1175","title":["Safety in Space: A Changing Picture?"],"author":[{"given":"Emma","family":"Taylor","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r924","title":["Safety-Critical Software and Safety-Critical Artificial Intelligence: Integrating New Practices and New Safety Concerns for AI systems"],"author":[{"given":"Mark","family":"Douthwaite","sequence":"first","affiliation":[]},{"given":"Tim","family":"Kelly","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,2,6]]}},{"DOI":"10.65391\/r1335","title":["The pivotal pandemic - Why we urgently need to fix IT"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3302","title":["Senior Leadership Forum Safety Management Systems"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r3189","title":["SCSC Statement on the Post Office Horizon"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r1183","title":["A Comment on IEC TR 63069"],"author":[{"given":"Martyn","family":"Thomas","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3091","title":["Bring Three and Fourpence We\u2019re Going to Advance"],"author":[{"given":"Graham","family":"Jolliffe","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1172","title":["Quantifying Dataset Properties for Systematic Artificial Neural Network Classifier Verification"],"author":[{"given":"Alex","family":"White","sequence":"first","affiliation":[]},{"given":"Darryl","family":"Hond","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Asgari","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3248","title":["60 Seconds with \u2026 Zoe Garstang"],"author":[{"given":"Zo\u00eb","family":"Garstang","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r1733","title":["Co-evolving development, implementation and Operational SMS using a Digital Twin"],"author":[{"given":"Alastair","family":"Faulkner","sequence":"first","affiliation":[]},{"given":"Mark","family":"Nicholson","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r932","title":["The Increasing Risks of Risk Assessment: On the Rise of Artificial Intelligence and Non-Determinism in Safety-Critical Systems"],"author":[{"given":"Chris","family":"Johnson","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r1675","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r938","title":["Agile development of safety-related industrial automation solutions"],"author":[{"given":"Ajay","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Reinelt","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r3235","title":["Safer Autonomous Systems Training Network"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r1205","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1331","title":["PETER \u2013 A Pan-European Training, Researchand Education network onElectromagnetic Risk Management"],"author":[{"given":"Davy","family":"Pissoort","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3239","title":["Tech Trip Report STEAM GWR Museum"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,5,1]]}},{"DOI":"10.65391\/r3309","title":["Formalising the Language of Risk"],"author":[{"given":"Dave","family":"Banham","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,2,10]]}},{"DOI":"10.65391\/r1317","title":["Safety-critical wireless communication links"],"author":[{"given":"Michael","family":"Green","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3094","title":["AI Safety and Security"],"author":[{"given":"John","family":"McDermid","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3088","title":["Practical Examples of a New Approach to\nCreating Clear Operational Safety Cases"],"author":[{"given":"Jane","family":"Fenn","sequence":"first","affiliation":[]},{"given":"Mark","family":"Nicholson","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3191","title":["Building Safety Post Grenfell"],"author":[{"given":"Laura","family":"Mills","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r3212","title":["Requirements in the Loop The Future of Model-Based System Engineering"],"author":[{"given":"Yves","family":"G\u00e9nevaux","sequence":"first","affiliation":[]},{"given":"Ken","family":"Nathan","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Gaucher","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Joffret","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,1,1]]}},{"DOI":"10.65391\/r3124","title":["Safety and Highly Automated Machinery"],"author":[{"given":"Aim\u00e9e","family":"de Koning","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r3125","title":["Entropy, Disorder, The Human Race, Religious Beliefs"],"author":[{"given":"Malcolm","family":"Jones","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r3250","title":["Seminar Report - Accident Investigation and Safety Culture"],"author":[{"given":"Michael","family":"Wright","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r3101","title":["HAZOP Re-Examined: Exposing the Challenges Posed by Edge Computing Devices in Safety Systems"],"author":[{"given":"Eberechi","family":"Weli","sequence":"first","affiliation":[]},{"given":"Ashley","family":"Zee","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3185","title":["Evidence Management \u2013 A Policing Perspective"],"author":[{"given":"Bill","family":"Blackburn","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,5,16]]}},{"DOI":"10.65391\/r3098","title":["Impact from Tools on System Safety and Security"],"author":[{"given":"Oscar","family":"Slotosch","sequence":"first","affiliation":[]},{"given":"Marcel","family":"Ropos","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1187","title":["Psychological safety - facilitating self-reporting of error, mistakes and non-compliance: A rapid review for the Energy Institute"],"author":[{"given":"Michael","family":"Wright","sequence":"first","affiliation":[]},{"given":"Sam","family":"Opiah","sequence":"additional","affiliation":[]},{"given":"Suzanne","family":"Croes","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1321","title":["The Future of Satellite Launch from the UK"],"author":[{"given":"John","family":"Holmes","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3228","title":["Symposium Report - Safety-Critical Systems Club Symposium 2020"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r1524","title":["Design-time Specification of Dynamic Modular Safety Cases in Support of Run-Time Safety Assessment"],"author":[{"given":"Barbara","family":"Gallina","sequence":"first","affiliation":[]},{"given":"Carmen","family":"C\u00e2rlan","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Elham","family":"Mirzaei","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1904","title":["Byzantine Generals Attack an Airbus A320"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3246","title":["Tech Trip Report Bletchley Park"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r3161","title":["Working Group Report Safety of Autonomous Systems"],"author":[{"given":"Rob","family":"Alexander","sequence":"first","affiliation":[]},{"given":"Philippa","family":"Ryan","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2017,4,1]]}},{"DOI":"10.65391\/r3257","title":["60 Secs with \u2026 Aimee Avrill"],"author":[{"given":"Aimee","family":"Avrill","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3149","title":["Robust AI Planning"],"author":[{"given":"Colin","family":"O'Halloran","sequence":"first","affiliation":[]},{"given":"Paul","family":"Whittaker","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Tudor","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,5,1]]}},{"DOI":"10.65391\/r3294","title":["Engineering, Ethics and Doughnut Economics"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r3341","title":["AI-Enabled Monitoring of Space Robotics Telemetry"],"author":[{"given":"Shaun","family":"Feakins","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Lesser","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Joyce","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Diemert","sequence":"additional","affiliation":[]},{"given":"Malav","family":"Naik","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Casey","sequence":"additional","affiliation":[]},{"given":"Nader","family":"Samid","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1739","title":["IEC 63187 \u2013 Tackling complexity in defence systems to ensure safety"],"author":[{"given":"James","family":"Inge","sequence":"first","affiliation":[]},{"given":"Phil","family":"Williams","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r142","title":["Goal Structuring Notation Community Standard (Version 2)"],"author":[{"name":"ACWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r2994","title":["Developing Safer Complex Systems"],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1319","title":["Data Safety in Virus Outbreaks:Lessons Learnt and Recommendations"],"author":[{"given":"Nick","family":"Hales","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3291","title":["The Future of Coding for Safety-Critical Systems"],"author":[{"given":"Dewi","family":"Daniels","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r3369","title":["Cracking Tales of Safety-Critical Cables"],"author":[{"given":"Wendy","family":"Owen","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Wiggins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3194","title":["Seminar Report - SSS\u201921"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r3338","title":["Transforming Formal Verification - Insights from MALPAS"],"author":[{"given":"Lavinia","family":"Burski","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3083","title":["Safe Integration of Machine Learning in Aircraft Platforms"],"author":[{"given":"Gary","family":"Brown","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r3199","title":["Architecting Wireless for Safety Critical M2M Comms"],"author":[{"given":"Michael","family":"Green","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r1181","title":["Developments in Safety &amp; Security Integration: Remotely Piloted Unmanned Aircraft Systems Command and Control"],"author":[{"given":"Jonathan","family":"Pugh","sequence":"first","affiliation":[]},{"given":"Paul","family":"Hampton","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ball","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r1738","title":["Can software engineering methods give us better software safety standards?"],"author":[{"given":"James","family":"Inge","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3259","title":["Modelling Our World"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1084","title":["Credible Autonomy Safety Argumentation"],"author":[{"given":"Aaron","family":"Kane","sequence":"first","affiliation":[]},{"given":"Jen","family":"Black","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Koopman","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,7]]}},{"DOI":"10.65391\/r1177","title":["A Practical Assurance Approach for Multi-Cores (MCs) Within Safety-Critical Software Applications"],"author":[{"given":"Mark","family":"Hadley","sequence":"first","affiliation":[]},{"given":"Mike","family":"Standish","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2020,2,11]]}},{"DOI":"10.65391\/r3360","title":["A Tutorial on Varieties of Possibility Analysis"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,31]]}},{"DOI":"10.65391\/r1916","title":["Safety and Certification Considerations of eVTOL Aircraft"],"author":[{"given":"Benita","family":"Lawrence","sequence":"first","affiliation":[]},{"given":"George","family":"Head","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3258","title":["Seminar Report - Seminar Safe Autonomous Transport"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1722","title":["Engineering safety-critical systems with open-source software"],"author":[{"given":"Paul","family":"Albertella","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1750","title":["A Practical Approach for the automation of product safety case generation in CI Framework"],"author":[{"given":"Doria","family":"Ramadan","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r1349","title":["Data Safety Guidance (Version 3.3)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1942","title":["Safety Assurance Objectives for Autonomous Systems V4"],"author":[{"name":"SASWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3270","title":["Getting to Know You An update from the Safety Futures Initiative"],"author":[{"given":"Zo\u00eb","family":"Garstang","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r3122","title":["On-Board Safety Monitoring for Drones"],"author":[{"given":"Nick","family":"Tudor","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r1212","title":["Service Assurance Guidance"],"author":[{"name":"SAWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1730","title":["A Service Analysis of the Mont Blanc Tunnel Fire"],"author":[{"given":"Fathi","family":"Tarada","sequence":"first","affiliation":[]},{"given":"James","family":"Catmur","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"King","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,2,7]]}},{"DOI":"10.65391\/r3162","title":["Guest Editorial Twenty-Five Years of Safety - SSS'17 A Personal Perspective"],"author":[{"given":"Dick","family":"Selwood","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2017,4,1]]}},{"DOI":"10.65391\/r3205","title":["Seminar Report - Frameworks for Safe AI Systems"],"author":[{"given":"Catherine","family":"Menon","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,10,10]]}},{"DOI":"10.65391\/r1529","title":["A Step-by-Step Methodology for Applying Service Assurance"],"author":[{"given":"James","family":"Catmur","sequence":"first","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Sleath","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3273","title":["60 Seconds with \u2026 Dr Emma Taylor"],"author":[{"given":"Emma","family":"Taylor","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,13]]}},{"DOI":"10.65391\/r3123","title":["Bridging Gaps in ISO 26262 for Testing Machine Learning (ML) Systems"],"author":[{"given":"Padma","family":"Iyenghar","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,5,27]]}},{"DOI":"10.65391\/r3249","title":["Thought for the Symposium"],"author":[{"given":"Tim","family":"Kelly","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,5,20]]}},{"DOI":"10.65391\/r929","title":["Regulatory perspective on the review and content of a behaviour-based safety case"],"author":[{"given":"Andrew","family":"Eaton","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Barker","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2018,1,11]]}},{"DOI":"10.65391\/r3260","title":["IET Young Woman Engineer Awards"],"author":[{"given":"Louise","family":"Harney","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,2,1]]}},{"DOI":"10.65391\/r1532","title":["Human Reliability in Complex Systems"],"author":[{"given":"Rachel","family":"Selfe","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r3342","title":["Authority, Emotion, and Communication Breakdown - An Analysis of the Air France Flight 447 Accident"],"author":[{"given":"Mohamad","family":"Cherry","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3362","title":["SCSC Timeline"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,23]]}},{"DOI":"10.65391\/r3285","title":["How Do I Get Into Safety"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Roger","family":"Rivett","sequence":"additional","affiliation":[]},{"given":"Jane","family":"Fenn","sequence":"additional","affiliation":[]},{"given":"Dewi","family":"Daniels","sequence":"additional","affiliation":[]},{"given":"Sean","family":"White","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,10,1]]}},{"DOI":"10.65391\/r1320","title":["Using Bayesian Modelling to Predict Software Defects"],"author":[{"given":"Chris","family":"Hobbs","sequence":"first","affiliation":[]},{"given":"Waqar","family":"Ahmed","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3217","title":["Software in Railway Applications"],"author":[{"given":"Lucia","family":"Capogna","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2023,10,12]]}},{"DOI":"10.65391\/r3352","title":["An Updatable Process to Assess Human Interaction with Artificial Intelligence and Advanced Automation Over Time"],"author":[{"given":"Abigail","family":"Post","sequence":"first","affiliation":[]},{"given":"David","family":"Woods","sequence":"additional","affiliation":[]},{"given":"Martijn","family":"IJtsma","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1712","title":["The Future of Safe Systems"],"published":{"date-parts":[[2023,2,4]]}},{"DOI":"10.65391\/r3148","title":["Management of Change in an Ever-changing World"],"author":[{"given":"Keith","family":"Collyer","sequence":"first","affiliation":[]},{"given":"Wendy","family":"Owen","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,5,1]]}},{"DOI":"10.65391\/r1928","title":["Seeing beyond the Post Office Horizon"],"author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1259","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r1898","title":["Safe AI Systems"],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r1857","title":["Reducing the Risk of a Software Common Mode Failure"],"author":[{"given":"James","family":"Sharp","sequence":"first","affiliation":[]},{"given":"Mark","family":"Hadley","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Ashmore","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,9,1]]}},{"DOI":"10.65391\/r1697","title":["Data Safety Guidance (Version 3.5)"],"author":[{"name":"DSIWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r3353","title":["Towards predictive accident prevention - can retrieval-augmented generation powered artificial intelligence inform preventative mitigation"],"author":[{"given":"Joshua","family":"Riley","sequence":"first","affiliation":[]},{"given":"Kez","family":"Whitehead","sequence":"additional","affiliation":[]},{"given":"Mathew","family":"Wylie","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3347","title":["Integration of Human Factors into Complex System Safety"],"author":[{"given":"James","family":"Inge","sequence":"first","affiliation":[]},{"given":"Ian","family":"Hartwell","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Carter","sequence":"additional","affiliation":[]},{"given":"Katia","family":"Potiron","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3214","title":["How Do I Get Into Safety"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"James","family":"Inge","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Harney","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2023,10,12]]}},{"DOI":"10.65391\/r1056","title":["The Risk of Relying on a Public Communications Infrastructure"],"author":[{"given":"Christian","family":"Raspotnig","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"de Haan","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Ladkin","sequence":"additional","affiliation":[]},{"given":"Pierantonia","family":"Sterlini","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2019,2,5]]}},{"DOI":"10.65391\/r1328","title":["An \u201cAs Desired\u201d Model of the Software Safety Assurance Lifecycle"],"author":[{"given":"Mark","family":"Nicholson","sequence":"first","affiliation":[]},{"given":"Matt","family":"Osborne","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3350","title":["Automated Driving (AD) Residual Risk"],"author":[{"given":"Helen","family":"Monkhouse","sequence":"first","affiliation":[]},{"given":"Michael","family":"Orgill","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r3226","title":["Service Assurance Guidance"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r3231","title":["Boeing 737 MAX \u2013 Safe to Fly"],"author":[{"given":"Paul","family":"Hampton","sequence":"first","affiliation":[]},{"given":"Dewi","family":"Daniels","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,1]]}},{"DOI":"10.65391\/r1503","title":["Service Assurance Guidance Version 3"],"author":[{"name":"SAWG","sequence":"first","affiliation":[]}]},{"DOI":"10.65391\/r1318","title":["Safety Cases: An Impending Crisis?"],"author":[{"given":"Ibrahim","family":"Habli","sequence":"first","affiliation":[]},{"given":"Richard","family":"Hawkins","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Alexander","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2021,2,9]]}},{"DOI":"10.65391\/r3176","title":["Planes and Computers"],"author":[{"given":"Stan","family":"Price","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r3356","title":["An AI-Based Toolchain Vision for Developing Safety Critical and Compliant Systems"],"author":[{"given":"Oscar","family":"Slotosch","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2025,12,9]]}},{"DOI":"10.65391\/r1535","title":["Could the Introduction of Assured Autonomy Change Accident Outcomes?"],"author":[{"given":"Bernard","family":"Twomey","sequence":"first","affiliation":[]},{"given":"Chris","family":"Hobbs","sequence":"additional","affiliation":[]},{"given":"Dewi","family":"Daniels","sequence":"additional","affiliation":[]},{"given":"John","family":"McDermid","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Parsons","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2022,2,8]]}},{"DOI":"10.65391\/r1311","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3227","title":["Tim Kelly\u2019s SSS\u201920 After-dinner Speech"],"author":[{"given":"Tim","family":"Kelly","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,5,14]]}},{"DOI":"10.65391\/r1249","title":["Safety-Critical Systems Newsletter"]},{"DOI":"10.65391\/r3174","title":["60 Seconds with \u2026 Dr Mike Parsons"],"author":[{"given":"Mike","family":"Parsons","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2022,1,29]]}},{"DOI":"10.65391\/r3301","title":["AI Governance Exploring Key Regulatory Approaches"],"author":[{"given":"George","family":"Mason","sequence":"first","affiliation":[]},{"given":"Greg","family":"Chance","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,2,7]]}},{"DOI":"10.65391\/r3193","title":["Introducing the Safety-Critical Systems eJournal"],"author":[{"given":"John","family":"Spriggs","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2021,5,13]]}},{"DOI":"10.65391\/r1903","title":["The \u2018Golden Thread\u2019 of Information: A Systems Approach to Construction Safety"],"author":[{"given":"Mikela","family":"Chatzimichailidou","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2024,2,12]]}},{"DOI":"10.65391\/r3264","title":["If Music be the Food of Love, Sing On, Sing On, But How"],"author":[{"given":"Peter","family":"Ladkin","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2020,10,31]]}},{"DOI":"10.65391\/r3146","title":["Towards Defect-based Testing for Safety-critical ML Components"],"author":[{"given":"Amit","family":"Sahu","sequence":"first","affiliation":[]},{"given":"Carmen","family":"C\u00e2rlan","sequence":"additional","affiliation":[]}],"published":{"date-parts":[[2024,8,13]]}},{"DOI":"10.65391\/r3361","title":["Enhancing Bowtie Hazard Analysis"],"author":[{"given":"Jon","family":"Ricketts","sequence":"first","affiliation":[]}],"published":{"date-parts":[[2026,1,31]]}}],"items-per-page":700,"query":{"start-index":0,"search-terms":null}}}