{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T01:25:21Z","timestamp":1775265921381,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030010560","type":"print"},{"value":"9783030010577","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T00:00:00Z","timestamp":1541635200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-01057-7_68","type":"book-chapter","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T15:45:17Z","timestamp":1541605517000},"page":"924-935","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Development of a Software System to Ensure the Reliability and Fault Tolerance in Information Systems Based on Expert Estimates"],"prefix":"10.1007","author":[{"given":"Askar","family":"Boranbayev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seilkhan","family":"Boranbayev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Assel","family":"Nurusheva","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,11,8]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Vucovich, J.P.: Risk assessment in early software design based on the software function-failure design method. In: Proceedings of the 31st Annual International Computer Software and Applications Conference, Institute of Electrical and Electronics Engineers (IEEE), Aug. 2007, pp. 405\u2013412 (2007)","DOI":"10.1109\/COMPSAC.2007.184"},{"key":"68_CR2","first-page":"729","volume-title":"Advances in Intelligent Systems and Computing","author":"Askar Boranbayev","year":"2018","unstructured":"Boranbayev, A., Boranbayev, S., Yersakhanov, K., Nurusheva, A., Taberkhan, R.: Methods of ensuring the reliability and fault tolerance of information systems. In: 15th International Conference of Information Technology, Information Technology - New Generations, pp. 729\u2013730 (2018)"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Grantham Lough, K., Stone, R., Tumer, I.: Prescribing and implementing the risk in early design (RED) method. In: Proceedings of DETC\u201906, number DETC2006\u201399374, Philadelphia, PA, Sept. 2006, pp. 431\u2013439 (2006)","DOI":"10.1115\/DETC2006-99374"},{"key":"68_CR4","unstructured":"Daniel, A.: The risk mitigation strategy taxonomy and generated risk event effect neutralization method. Doctoral Dissertations, p. 176 (2012)"},{"key":"68_CR5","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1080\/09544820701684271","volume":"2","author":"KG Lough","year":"2009","unstructured":"Lough, K.G., Stone, R., Tumer, I.: The risk in early design method. J. Eng. Des. 2, 155\u2013173 (2009). https:\/\/doi.org\/10.1080\/09544820701684271","journal-title":"J. Eng. Des."},{"key":"68_CR6","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1007\/s11668-013-9728-8","volume":"3","author":"D Krus","year":"2013","unstructured":"Krus, D., Grantham, K.: Failure prevention through the cataloging of successful risk mitigation strategies. J. Eng. Des. 3, 712\u2013721 (2013). https:\/\/doi.org\/10.1007\/s11668-013-9728-8","journal-title":"J. Eng. Des."},{"issue":"2","key":"68_CR7","first-page":"126","volume":"2","author":"KG Lough","year":"2008","unstructured":"Lough, K.G., Stone, R.B., Tumer, I.Y.: Implementation procedures for the risk in early design (red) method. J. Ind. Syst. Eng. 2(2), 126\u2013143 (2008)","journal-title":"J. Ind. Syst. Eng."},{"key":"68_CR8","doi-asserted-by":"publisher","unstructured":"Lough, K.G., Stone, R.B., Tumer, I.Y.: The risk in early design (RED) method: likelihood and consequence formulations. In: Proceedings of DETC\u201906: ASME 2005 International Design Engineering Technical Conference 1\u201311. https:\/\/doi.org\/10.1115\/DETC2006-99375","DOI":"10.1115\/DETC2006-99375"},{"key":"68_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.4236\/mme.2012.22004","volume":"2","author":"K Grantham","year":"2012","unstructured":"Grantham, K., Elrod, C., Flaschbart, B., Kehr, W.: Identifying risk at the conceptual product design phase: a web-based software solution and its evaluation. Mod. Mech. Eng. 2, 25\u201334 (2012)","journal-title":"Mod. Mech. Eng."},{"key":"68_CR10","doi-asserted-by":"crossref","unstructured":"Grantham Lough, K., Stone, R., Tumer, I.: The risk in early design (RED) method: likelihood and consequence formulations. In: Proceedings of DETC\u201906, number DETC2006-99375, Philadelphia, PA, Sept. 2006, pp. 1119\u20131129 (2006)","DOI":"10.1115\/DETC2006-99375"},{"key":"68_CR11","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1016\/j.promfg.2015.07.295","volume":"3","author":"M AlKazimi","year":"2015","unstructured":"AlKazimi, M., Altabbakh, H., Murray, S., Grantham, K.: Evaluating generated risk event effect neutralization as a new mitigation strategy tool in the upstream industry. Procedia Manuf. 3, 1374\u20131378 (2015)","journal-title":"Procedia Manuf."},{"key":"68_CR12","unstructured":"Main fields of bug\/defect report\/Website Pro Testing - Software Testing. Available: http:\/\/www.protesting.ru\/testing\/bugstructure.html"},{"key":"68_CR13","unstructured":"CWE\/SANSTop 25 Most Dangerous Software Errors\/Website CWE. Available: http:\/\/cwe.mitre.org\/top25\/"},{"key":"68_CR14","unstructured":"Bug report\/Website Pro Testing - Software Testing. Available: http:\/\/www.protesting.ru\/documentation\/bug_report_example_ru.zip"},{"key":"68_CR15","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Altayev, S., Boranbayev, A.: Applying the method of diverse redundancy in cloud based systems for increasing reliability. In: Proceedings of the 12th International Conference on Information Technology: New Generations (ITNG 2015), 13\u201315 Apr. 2015, Las Vegas, Nevada, USA, pp. 796\u2013799 (2015)","DOI":"10.1109\/ITNG.2015.145"},{"key":"68_CR16","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Boranbayev, A., Altayev, S., Nurbekov, A.: Mathematical model for optimal designing of reliable information systems. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies-AICT2014, Astana, Kazakhstan, 15\u201317 Oct. 2014, pp. 123\u2013127 (2014)","DOI":"10.1109\/ICAICT.2014.7035926"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01057-7_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:20:38Z","timestamp":1775262038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01057-7_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,8]]},"ISBN":["9783030010560","9783030010577"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01057-7_68","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,8]]},"assertion":[{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys2018\/CallforPapers","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}