{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:21Z","timestamp":1742914221930,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030262495"},{"type":"electronic","value":"9783030262501"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26250-1_9","type":"book-chapter","created":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T19:02:43Z","timestamp":1567364563000},"page":"117-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applications"],"prefix":"10.1007","author":[{"given":"Torge","family":"Hinrichs","sequence":"first","affiliation":[]},{"given":"Bettina","family":"Buth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"key":"9_CR1","unstructured":"Borken-Kleefeld, J., Dallmann, T.: Remote sensing of motor vehicle exhaust emissions, February 2018. \n                      https:\/\/www.theicct.org\/publications\/vehicle-emission-remote-sensing\n                      \n                    . Accessed Mar 2019"},{"key":"9_CR2","unstructured":"Smart Citizen Projekt (2019). \n                      https:\/\/smartcitizen.me\/\n                      \n                    . Accessed Mar 2019"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47, 445\u2013487 (2005)","journal-title":"Comput. Netw."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/ACCESS.2016.2519820","volume":"4","author":"M Pouryazdan","year":"2016","unstructured":"Pouryazdan, M., Kantarci, B., Soyata, T., Song, H.: Anchor-assisted and vote-based trustworthiness assurance in smart city crowdsensing. IEEE Access 4, 529\u2013541 (2016)","journal-title":"IEEE Access"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Sutaone, M., Mukherj, P., Paranjape, S.: Trust-based cluster head validation and outlier detection technique for mobile wireless sensor networks. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India (2016)","DOI":"10.1109\/WiSPNET.2016.7566505"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Sitanayah, L.: Robust sensor network deployment with priority based on failure centrality. In: 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Kuta, Indonesia (2018)","DOI":"10.1109\/ICITEED.2018.8534903"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Rossini, R., Ferrera, E., Conzon, D., Pastrone, C.: WSNs self-calibration approach for smart city applications leveraging incremental machine learning techniques. In: 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Cyprus (2016)","DOI":"10.1109\/NTMS.2016.7792490"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Bogatinoska, D.C., Malekian, R., Trengoska, J., Nyako, W.A.: Advanced sensing and internet of things in smart cities. In: 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia (2016)","DOI":"10.1109\/MIPRO.2016.7522218"},{"key":"9_CR9","unstructured":"RTCA DO-178C, Software Considerations in Airborne Systems and Equipment Certification (2011)"},{"key":"9_CR10","unstructured":"Federal Aviation Administration. \n                      https:\/\/www.faa.gov\/\n                      \n                    . Accessed Mar 2019"},{"key":"9_CR11","unstructured":"European Union Aviation Safety Agency: European Union Aviation Safety Agency. \n                      https:\/\/www.easa.europa.eu\/\n                      \n                    . Accessed Mar 2019"},{"key":"9_CR12","unstructured":"Standardization IOf: ISO 26262:2018 Road vehicles \u2013 Functional safety, Geneva (2018)"},{"key":"9_CR13","unstructured":"International Electrotechnical Commission: Failure Mode and Effects analysis (FMEA) (IEC 56\/1579\/CD:2014) (2015)"},{"key":"9_CR14","unstructured":"International Electrotechnical Commission: IEC 61025:2006 Fault tree analysis (FTA) (2006)"},{"key":"9_CR15","unstructured":"Woodhouse, R.M., Lutz, R.R.: Requirements analysis using forward and backward search (1997)"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1147\/rd.201.0020","volume":"20","author":"JR Sklaroff","year":"1976","unstructured":"Sklaroff, J.R.: Redundancy management technique for space shuttle computers. IBM 20, 20\u201328 (1976)","journal-title":"IBM"},{"key":"9_CR17","unstructured":"Nova Fitness Co., Ltd.: Laser PM2.5 Sensor specification, 9 October 2015. \n                      https:\/\/cdn-reichelt.de\/documents\/datenblatt\/X200\/SDS011-DATASHEET.pdf\n                      \n                    . Accessed Mar 2019"},{"key":"9_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16187-3_29","volume-title":"Applying Safety Methods To Sensor Networks","author":"T Hinrichs","year":"2019","unstructured":"Hinrichs, T., Buth, B.: Applying Safety Methods To Sensor Networks. Springer, La Toja Island (2019)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26250-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T16:59:56Z","timestamp":1572454796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26250-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030262495","9783030262501"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26250-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turku","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.ncl.ac.uk\/safecomp2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}