{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:15:18Z","timestamp":1743009318032,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030871000"},{"type":"electronic","value":"9783030871017"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87101-7_3","type":"book-chapter","created":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T23:40:49Z","timestamp":1632094849000},"page":"18-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security-Based Safety Hazard Analysis Using FMEA: A DAM Case Study"],"prefix":"10.1007","author":[{"given":"Irum","family":"Inayat","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Farooq","sequence":"additional","affiliation":[]},{"given":"Zubaria","family":"Inayat","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,20]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Kayan, H., Nunes, M., Rana, O., Burnap, P., Perera, C.: Cybersecurity of industrial cyber-physical systems: a review. Cryptogr. Secur. 32 (2021)","DOI":"10.1145\/3510410"},{"key":"3_CR2","unstructured":"Lewis, J.A.: Significant Cyber Incidents since 2006, Center for Strategic and International Studies, p. 57 (2021)"},{"issue":"1","key":"3_CR3","first-page":"499","volume":"9","author":"MN Al-Mhiqani","year":"2018","unstructured":"Al-Mhiqani, M.N., et al.: Cyber-security incidents: a review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Appl. 9(1), 499\u2013508 (2018)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"3_CR4","unstructured":"Lee, R.M., Assante, M.J., Conway, T.: German Steel Mill Cyber Attack, ICS Def. Use Case, p. 15 (2014)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dehlawi, Z., Abokhodair, N.: Saudi Arabia\u2019s response to cyber conflict: a case study of the Shamoon malware incident. In: IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics Big Data, Emergent Threats, and Decision-Making in Security Informatics, pp. 73\u201375 (2013)","DOI":"10.1109\/ISI.2013.6578789"},{"issue":"March","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2020.03.007","volume":"155","author":"T Alladi","year":"2020","unstructured":"Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput. Commun. 155(March), 1\u20138 (2020)","journal-title":"Comput. Commun."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Fu, R., Bao, X., Zhao, T.: Generic safety requirements description templates for the embedded software. In: 2017 9th IEEE International Conference on Communication Software and Networks, ICCSN 2017, p. 5 (2017)","DOI":"10.1109\/ICCSN.2017.8230353"},{"key":"3_CR8","unstructured":"De Azevedo, M.T., Martins, A.B., Kofuji, S.T.: ISA99 - Security Standards in water treatment plants. In: Water\/Wastewater Automatic Controls Symposium, pp. 1\u201315 (2013)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Gall, H.: Functional Safety IEC 61508 \/ IEC 61511 the impact to certification and the user. In: AICCSA 08 - 6th IEEE\/ACS International Conference on Computer Systems and Applications, pp. 1027\u20131031 (2008)","DOI":"10.1109\/AICCSA.2008.4493673"},{"key":"3_CR10","unstructured":"Sayfayn, N., Madnick, S.: Cybersafety analysis of the maroochy shire sewage spill cybersafety analysis of the maroochy shire sewage spill. Cybersecurity Interdiscip. Syst. Lab. 1\u201329 (2017)"},{"issue":"3","key":"3_CR11","first-page":"25","volume":"9","author":"T Lu","year":"2015","unstructured":"Lu, T., Zhao, J., Zhao, L., Li, Y., Zhang, X.: Towards a framework for assuring cyber physical system security. Int. J. Secur. its Appl. 9(3), 25\u201340 (2015)","journal-title":"Int. J. Secur. its Appl."},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MPOT.2017.2737201","volume":"36","author":"N Scaife","year":"2017","unstructured":"Scaife, N., Traynor, P., Butler, K.: Making sense of the ransomware mess (and planning a sensible path forward). IEEE Potentials 36(6), 28\u201331 (2017)","journal-title":"IEEE Potentials"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Alelyani, S., Harish Kumar, G.R.: Overview of cyberattack on Saudi organizations. J. Inf. Secur. Cybercrimes Res. (2018)","DOI":"10.26735\/16587790.2018.004"},{"key":"3_CR14","unstructured":"Sulaman, S.M., Beer, A., Felderer, M., Host, M.: Comparison of the FMEA and STPA safety analysis methods-a case study. In: Lecture Notes in Informatics (LNI), Proceedings - Ser. Gesellschaft fur Inform., vol. P-292, pp. 175\u2013176 (2019)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Kriaa, S., Bouissou, M., Laarouchi, Y.: SCADA safety and security joint modeling (S-cube): case study of a dam (2016)","DOI":"10.1049\/cp.2015.0293"}],"container-title":["Communications in Computer and Information Science","Database and Expert Systems Applications - DEXA 2021 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87101-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T22:03:29Z","timestamp":1649887409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87101-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030871000","9783030871017"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87101-7_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/dexa2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"DEXA 2021 Workshops: 50 papers submitted, 23 papers accepted","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}