{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:02:02Z","timestamp":1753354922692,"version":"3.40.3"},"publisher-location":"London","reference-count":14,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447124931"},{"type":"electronic","value":"9781447124948"}],"license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-1-4471-2494-8_8","type":"book-chapter","created":{"date-parts":[[2012,1,3]],"date-time":"2012-01-03T18:10:05Z","timestamp":1325614205000},"page":"85-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["CyberSafety: CyberSecurity and Safety-Critical Software Engineering"],"prefix":"10.1007","author":[{"given":"Chris","family":"Johnson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2011,12,1]]},"reference":[{"key":"8_CR1_8","unstructured":"Abrams M, Weiss J (2008) Malicious control system cyber security attack case study \u2013 Maroochy Water Services, Australia. NIST\/Mitre Corporation, NIST Industrial Control System Security Project. http:\/\/csrc.nist.gov\/sec-cert\/ics\/index.html. Accessed 14 September 2011"},{"key":"8_CR2_8","volume-title":"Security engineering: a guide to building dependable distributed systems","author":"R Anderson","year":"2008","unstructured":"Anderson R (2008) Security engineering: a guide to building dependable distributed systems. Wiley, Indianapolis, USA"},{"key":"8_CR3_8","unstructured":"DoT (2009) Report on review of web applications security and intrusion detection in air traffic control systems. FAA Report Number FI-2009-049. US Department of Transport, Washington DC, USA"},{"key":"8_CR4_8","unstructured":"EUROCONTROL (2004) European manual of personnel licensing - air traffic controllers. Edn 2.0. EUROCONTROL, Brussels, Belgium"},{"key":"8_CR5_8","unstructured":"GAO (1998) Air traffic control: weak computer security practices jeopardize flight safety. Letter Report, 05\/18\/98, GAO\/AIMD-98-155. US General Accounting Office"},{"key":"8_CR6_8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C Haley","year":"2008","unstructured":"Haley C, Laney R, Moffett J, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans Softw Eng 34:133\u2013153","journal-title":"IEEE Trans Softw Eng"},{"key":"8_CR7_8","volume-title":"Proc 4th Form Methods for Interact Syst Workshop","author":"CW Johnson","year":"2011","unstructured":"Johnson CW (2011) Using assurance cases and Boolean logic driven Markov processes to formalise cyber security concerns for safety-critical interaction with global navigation satellite systems. In Bowen J, Reeves S (eds) Proc 4th Form Methods for Interact Syst Workshop, Limerick, Ireland"},{"key":"8_CR8_8","unstructured":"Johnson CW, Atencia Yepez A (2011) Mapping the impact of security threats on safety-critical global navigation satellite systems. In: Proc 29th Int Conf Syst Saf, Las Vegas, USA. International Systems Safety Society, Unionville, VA, USA"},{"key":"8_CR9_8","volume-title":"A roadmap for safer systems engineering","author":"CW Johnson","year":"2011","unstructured":"Johnson CW, Holloway CM (2011) A roadmap for safer systems engineering. IET Syst Saf Conf, The IET, London"},{"key":"8_CR10_8","volume-title":"Proc 26th Int Conf Syst Saf, Vancouver, Canada","author":"CW Johnson","year":"2008","unstructured":"Johnson CW, Shea C, Holloway CM (2008) The role of trust and interaction in GPS related accidents: a human factors safety assessment of the global positioning system (GPS). In: Simmons RJ, Mohan DJ, Mullane M (eds) Proc 26th Int Conf Syst Saf, Vancouver, Canada. International Systems Safety Society, Unionville, VA, USA"},{"key":"8_CR11_8","volume-title":"An architectural concept for intrusion tolerance in air traffic networks","author":"JM Maddalon","year":"2003","unstructured":"Maddalon JM, Miner PS (2003) An architectural concept for intrusion tolerance in air traffic networks. NASA Langley Technical Report, Integrated Communication Navigation and Surveillance (ICNS), Annapolis, Maryland"},{"key":"8_CR12_8","volume-title":"Cloud security and privacy: an enterprise perspective on risks and compliance","author":"T Mather","year":"2009","unstructured":"Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy: an enterprise perspective on risks and compliance. O\u2019Reilly Media, California, USA"},{"key":"8_CR13_8","unstructured":"Pederson P, Dudenhoeffer D, Hartley S, Permann M (2006) Critical infrastructure interdependency modelling: a survey of U.S. and international research. Technical Report INL\/EXT-06- 11464, Idaho National Laboratory, US Department of Energy"},{"key":"8_CR14_8","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.cose.2005.05.002","volume":"24","author":"M Theoharidoua","year":"2005","unstructured":"Theoharidoua M, Kokolakisb S, Karydaa M, Kiountouzisa E (2005) The insider threat to information systems and the effectiveness of ISO 17799. Comput & Secur 24:472\u2013484","journal-title":"Comput & Secur"}],"container-title":["Achieving Systems Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-2494-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T14:03:24Z","timestamp":1676124204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-2494-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,1]]},"ISBN":["9781447124931","9781447124948"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-2494-8_8","relation":{},"subject":[],"published":{"date-parts":[[2011,12,1]]},"assertion":[{"value":"1 December 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}