{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:13:26Z","timestamp":1766049206090},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_39","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"333-343","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification"],"prefix":"10.1007","author":[{"given":"Dmitry","family":"Levshun","sequence":"first","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Chechulin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.micpro.2015.12.006","volume":"42","author":"S Balasubramaniyan","year":"2016","unstructured":"Balasubramaniyan, S., Srinivasan, S., Buonopane, F., Subathra, B., Vain, J., Ramaswamy, S.: Design and verification of cyber-physical systems using truetime, evolutionary optimization and UPPAAL. Microprocess. Microsyst. 42, 37\u201348 (2016)","journal-title":"Microprocess. Microsyst."},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Canedo, A., Schwarzenbach, E., Faruque, M.A.A.: Context-sensitive synthesis of executable functional models of cyber-physical systems. In: 2013 ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 99\u2013108. IEEE (2013)","DOI":"10.1145\/2502524.2502539"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Desnitsky, V., Chechulin, A., Kotenko, I., Levshun, D., Kolomeec, M.: Application of a technique for secure embedded device design based on combining security components for creation of a perimeter protection system. In: 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), pp. 609\u2013616. IEEE (2016)","DOI":"10.1109\/PDP.2016.99"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.compind.2016.05.006","volume":"82","author":"P Hehenberger","year":"2016","unstructured":"Hehenberger, P., Vogel-Heuser, B., Bradley, D., Eynard, B., Tomiyama, T., Achiche, S.: Design, modelling, simulation and integration of cyber physical systems: methods and applications. Comput. Ind. 82, 273\u2013289 (2016)","journal-title":"Comput. Ind."},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.future.2015.06.006","volume":"56","author":"F Hu","year":"2016","unstructured":"Hu, F., Lu, Y., Vasilakos, A.V., Hao, Q., Ma, R., Patil, Y., Zhang, T., Lu, J., Li, X., Xiong, N.N.: Robust cyber-physical systems: concept, models, and implementation. Future Gener. Comput. Syst. 56, 449\u2013475 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Levshun, D., Chechulin, A., Kotenko, I.: Design lifecycle for secure cyber-physical systems based on embedded devices. In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 277\u2013282. IEEE (2017)","DOI":"10.1109\/IDAACS.2017.8095090"},{"issue":"11","key":"39_CR7","doi-asserted-by":"publisher","first-page":"2104","DOI":"10.1109\/JPROC.2015.2453253","volume":"103","author":"P Nuzzo","year":"2015","unstructured":"Nuzzo, P., Sangiovanni-Vincentelli, A.L., Bresolin, D., Geretti, L., Villa, T.: A platform-based design methodology with contracts and related tools for the design of cyber-physical systems. Proc. IEEE 103(11), 2104\u20132132 (2015)","journal-title":"Proc. IEEE"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.compind.2016.12.001","volume":"86","author":"O Penas","year":"2017","unstructured":"Penas, O., Plateaux, R., Patalano, S., Hammadi, M.: Multi-scale approach from mechatronic to cyber-physical systems for the design of manufacturing systems. Comput. Ind. 86, 52\u201369 (2017)","journal-title":"Comput. Ind."},{"key":"39_CR9","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.jocs.2014.07.001","volume":"10","author":"R Seiger","year":"2015","unstructured":"Seiger, R., Keller, C., Niebling, F., Schlegel, T.: Modelling complex and flexible processes for smart cyber-physical environments. J. Comput. Sci. 10, 137\u2013148 (2015)","journal-title":"J. Comput. Sci."},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.compind.2015.06.012","volume":"74","author":"S Srinivasan","year":"2015","unstructured":"Srinivasan, S., Buonopane, F., Vain, J., Ramaswamy, S.: Model checking response times in networked automation systems using jitter bounds. Comput. Ind. 74, 186\u2013200 (2015)","journal-title":"Comput. Ind."},{"issue":"1","key":"39_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TSG.2012.2232318","volume":"4","author":"A Srivastava","year":"2013","unstructured":"Srivastava, A., Morris, T., Ernster, T., Vellaithurai, C., Pan, S., Adhikari, U.: Modeling cyber-physical vulnerability of the smart grid with incomplete information. IEEE Trans. Smart Grid 4(1), 235\u2013244 (2013)","journal-title":"IEEE Trans. Smart Grid"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Xinyu, C., Huiqun, Y., Xin, X.: Verification of hybrid Chi model for cyber-physical systems using PHAVer. In: 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 122\u2013128. IEEE (2013)","DOI":"10.1109\/IMIS.2013.29"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:36:01Z","timestamp":1569922561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_39","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}