{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:29:52Z","timestamp":1768595392674,"version":"3.49.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030411305","type":"print"},{"value":"9783030411312","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41131-2_6","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T06:06:49Z","timestamp":1581919609000},"page":"108-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Advanced Hazard Analysis and Risk Assessment in the ISO 26262 Functional Safety Standard Using Rigorous Simulation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4175-4020","authenticated-orcid":false,"given":"Adam","family":"Duracz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3909-2227","authenticated-orcid":false,"given":"Ayman","family":"Aljarbouh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7545-9145","authenticated-orcid":false,"given":"Ferenc A.","family":"Bartha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8884-9839","authenticated-orcid":false,"given":"Jawad","family":"Masood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3513-8854","authenticated-orcid":false,"given":"Roland","family":"Philippsen","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Eriksson","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Duracz","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yingfu","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Grante","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"6_CR1","unstructured":"Acumen (2016). \nhttp:\/\/acumen-language.org"},{"key":"6_CR2","unstructured":"Aljarbouh, A.: Accelerated simulation of hybrid systems: method combining static analysis and run-time execution analysis (Simulation Acc\u00e9l\u00e9r\u00e9e des Syst\u00e8mes Hybrides: m\u00e9thode combinant analyse statique et analyse \u00e0 l\u2019ex\u00e9cution). Ph.D. thesis, University of Rennes 1, France (2017). \nhttps:\/\/tel.archives-ouvertes.fr\/tel-01614081"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-030-35092-5_2","volume-title":"Verification and Evaluation of Computer and Communication Systems","author":"A Aljarbouh","year":"2019","unstructured":"Aljarbouh, A.: Non-standard zeno-free simulation semantics for hybrid dynamical systems. In: Ganty, P., Ka\u00e2niche, M. (eds.) VECoS 2019. LNCS, vol. 11847, pp. 16\u201331. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-35092-5_2"},{"key":"6_CR4","unstructured":"Aljarbouh, A., Caillaud, B.: On the regularization of chattering executions in real time simulation of hybrid systems. In: 11th Baltic Young Scientists Conference, Tallinn, Estonia, p. 49, July 2015. \nhttps:\/\/hal.archives-ouvertes.fr\/hal-01246853"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Aljarbouh, A., Caillaud, B.: Robust simulation for hybrid systems: chattering path avoidance. In: Proceedings of the 56th Conference on Simulation and Modelling (SIMS 56), Link\u00f6ping University, Sweden, 7\u20139 October 2015, pp. 175\u2013185, No. 119. Link\u00f6ping University Electronic Press, Link\u00f6pings universitet (2015)","DOI":"10.3384\/ecp15119175"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Aljarbouh, A., Caillaud, B.: Chattering-free simulation of hybrid dynamical systems with the function mock-up interface 2.0. In: Proceedings of the First Japanese Modelica Conferences, Tokyo, Japan, 23\u201324 May 2016. Link\u00f6ping University Electronic Press, Link\u00f6pings universitet (2016)","DOI":"10.3384\/ecp1612495"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Aljarbouh, A., Zeng, Y., Duracz, A., Caillaud, B., Taha, W.: Chattering-free simulation for hybrid dynamical systems semantics and prototype implementation. In: 2016 IEEE International Conference on Computational Science and Engineering, CSE 2016, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2016, and 15th International Symposium on Distributed Computing and Applications for Business Engineering, DCABES 2016, Paris, France, 24\u201326 August 2016, pp. 412\u2013422 (2016). \nhttps:\/\/doi.org\/10.1109\/CSE-EUC-DCABES.2016.217","DOI":"10.1109\/CSE-EUC-DCABES.2016.217"},{"key":"6_CR8","unstructured":"ALM-PLM (2015). \nhttp:\/\/polarion.com"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1049\/iet-its.2009.0001","volume":"5","author":"LD Baskar","year":"2011","unstructured":"Baskar, L.D., De Schutter, B., Hellendoorn, J., Papp, Z.: Traffic control and intelligent vehicle highway systems: a survey. IET Intel. Transp. Syst. 5(1), 38\u201352 (2011)","journal-title":"IET Intel. Transp. Syst."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Basma, F., Tachwali, Y., Refai, H.H.: Intersection collision avoidance system using infrastructure communication. In: 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC), pp. 422\u2013427. IEEE, Washington, DC (2011)","DOI":"10.1109\/ITSC.2011.6083007"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39799-8_18","volume-title":"Computer Aided Verification","author":"X Chen","year":"2013","unstructured":"Chen, X., \u00c1brah\u00e1m, E., Sankaranarayanan, S.: Flow*: an analyzer for non-linear hybrid systems. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 258\u2013263. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39799-8_18"},{"issue":"1\u20134","key":"6_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1023\/B:NUMA.0000049462.70970.b6","volume":"37","author":"LH Figueiredo De","year":"2004","unstructured":"De Figueiredo, L.H., Stolfi, J.: Affine arithmetic: concepts and applications. Numer. Algorithms 37(1\u20134), 147\u2013158 (2004)","journal-title":"Numer. Algorithms"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-662-46681-0_5","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"PS Duggirala","year":"2015","unstructured":"Duggirala, P.S., Mitra, S., Viswanathan, M., Potok, M.: C2E2: a verification tool for stateflow models. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 68\u201382. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46681-0_5"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Duracz, A., Eriksson, H., Bartha, F.\u00c1., Zeng, Y., Xu, F., Taha, W.: Using rigorous simulation to support ISO 26262 hazard analysis and risk assessment. In: 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), pp. 1093\u20131096. IEEE, August 2015","DOI":"10.1109\/HPCC-CSS-ICESS.2015.296"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/978-3-662-44199-2_101","volume-title":"Mathematical Software \u2013 ICMS 2014","author":"J Duracz","year":"2014","unstructured":"Duracz, J., Farjudian, A., Kone\u010dn\u00fd, M., Taha, W.: Function interval arithmetic. In: Hong, H., Yap, C. (eds.) ICMS 2014. LNCS, vol. 8592, pp. 677\u2013684. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44199-2_101"},{"key":"6_CR16","unstructured":"EU Regulation No. 347\/2012: Type-approval requirements for certain categories of motor vehicles with regard to advanced emergency braking systems (2012)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-642-22110-1_30","volume-title":"Computer Aided Verification","author":"G Frehse","year":"2011","unstructured":"Frehse, G., et al.: SpaceEx: scalable verification of hybrid systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 379\u2013395. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22110-1_30"},{"key":"6_CR18","unstructured":"Henzinger, T.A.: The theory of hybrid automata. In: Logic in Computer Science, pp. 278\u2013292. IEEE Computer Society, New Brunswick (1996)"},{"key":"6_CR19","unstructured":"ISO26262: Road vehicles - functional safety (2011)"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-21437-0_6","volume-title":"FM 2011: Formal Methods","author":"SM Loos","year":"2011","unstructured":"Loos, S.M., Platzer, A., Nistor, L.: Adaptive cruise control: hybrid, distributed, and now formally verified. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 42\u201356. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21437-0_6"},{"key":"6_CR21","first-page":"4","volume":"4","author":"K Makino","year":"2003","unstructured":"Makino, K., Berz, M.: Taylor models and other validated functional inclusion methods. Int. J. Pure Appl. Math. 4, 4 (2003)","journal-title":"Int. J. Pure Appl. Math."},{"key":"6_CR22","unstructured":"Masood, J., Philippsen, R., Duracz, J., Taha, W., Eriksson, H., Grante, C.: Domain analysis for standardised functional safety: a case study on design-time verification of automatic emergency braking. In: International Federation of Automotive Engineering Societies 2014 World Automotive Congress, Maastricht, The Netherlands, 2\u20136 June 2014. FISITA (2014)"},{"key":"6_CR23","unstructured":"Medini analyze (2015). \nhttp:\/\/ikv.de"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-48983-5_17","volume-title":"Hybrid Systems: Computation and Control","author":"PJ Mosterman","year":"1999","unstructured":"Mosterman, P.J.: An overview of hybrid simulation phenomena and their support by simulation packages. In: Vaandrager, F.W., van Schuppen, J.H. (eds.) HSCC 1999. LNCS, vol. 1569, pp. 165\u2013177. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48983-5_17"},{"issue":"1","key":"6_CR25","first-page":"21","volume":"105","author":"NS Nedialkov","year":"1999","unstructured":"Nedialkov, N.S., Jackson, K.R., Corliss, G.F.: Validated solutions of initial value problems for ordinary differential equations. Appl. Math. Comput. 105(1), 21\u201368 (1999)","journal-title":"Appl. Math. Comput."},{"key":"6_CR26","unstructured":"Nedialkov, N.S., Von Mohrenschildt, M.: Rigorous simulation of hybrid dynamic systems with symbolic and interval methods. In: 2002 Proceedings of the American Control Conference, vol. 1, pp. 140\u2013147. IEEE (2002)"},{"key":"6_CR27","unstructured":"Prover (2015). \nhttp:\/\/prover.com"},{"issue":"2","key":"6_CR28","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.nahs.2010.05.010","volume":"5","author":"N Ramdani","year":"2011","unstructured":"Ramdani, N., Nedialkov, N.S.: Computing reachable sets for uncertain nonlinear hybrid systems using interval constraint-propagation techniques. Nonlinear Anal. Hybrid Syst. 5(2), 149\u2013162 (2011)","journal-title":"Nonlinear Anal. Hybrid Syst."},{"key":"6_CR29","unstructured":"RiskCAT (2015). \nhttp:\/\/cats-tools.de"},{"key":"6_CR30","unstructured":"SCADE design verifier (2015). \nhttp:\/\/esterel-technologies.com"},{"key":"6_CR31","unstructured":"Simulink design verifier (2015). \nhttp:\/\/mathworks.com"},{"key":"6_CR32","unstructured":"SOX2 (2015). \nhttp:\/\/enco-software.com"},{"key":"6_CR33","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-319-47063-4_11","volume-title":"Internet of Things. IoT Infrastructures","author":"W Taha","year":"2016","unstructured":"Taha, W.: Acumen: an open-source testbed for cyber-physical systems research. In: Mandler, B., et al. (eds.) IoT360 2015. LNICST, vol. 169, pp. 118\u2013130. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-47063-4_11"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Tucker, W.: Validated Numerics: A Short Introduction to Rigorous Computations (2011)","DOI":"10.2307\/j.ctvcm4g18"},{"key":"6_CR35","unstructured":"Ueda, K., Matsumoto, S.: Hyrose: a symbolic simulator of the hybrid constraint language HydLa. In: Computer Software, vol. 30. Citeseer (2013)"},{"key":"6_CR36","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Antonsson, E.K., Grote, K.: A new threat assessment measure for collision avoidance systems. In: 2006 IEEE Intelligent Transportation Systems Conference, ITSC 2006, pp. 968\u2013975. IEEE, September 2006. \nhttps:\/\/doi.org\/10.1109\/ITSC.2006.1706870","DOI":"10.1109\/ITSC.2006.1706870"}],"container-title":["Lecture Notes in Computer Science","Cyber Physical Systems. Model-Based Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41131-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T06:07:37Z","timestamp":1581919657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41131-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030411305","9783030411312"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41131-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CyPhy","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York City, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cyphy2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cyphy.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1-2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}