{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:55:31Z","timestamp":1761648931468,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_23","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"234-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparison of Safety and Security Analysis Techniques"],"prefix":"10.1007","author":[{"given":"Emilia","family":"Cioroaica","sequence":"first","affiliation":[]},{"given":"Smruti Ranjan","family":"Kar","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Sorokos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"23_CR1","unstructured":"AUTOSAR: AUTOSAR. https:\/\/www.autosar.org\/. Accessed 09 June 2021"},{"key":"23_CR2","unstructured":"Erik Nilsen, T., Li, J., Johnsen, S.O., Glomsrud, J.A.: Empirical studies of methods for safety and security co-analysis of autonomous boat. Safety and Reliability-Safe Societies in a Changing World (2018)"},{"key":"23_CR3","unstructured":"G\u00f6\u00dfling-Reisemann, S.: Resilience-preparing energy systems for the unexpected. An edited collection of authored pieces comparing, contrasting, and integrating risk and resilience with an emphasis on ways to measure resilience, p. 73 (2016)"},{"issue":"2","key":"23_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.2514\/1.A32449","volume":"51","author":"T Ishimatsu","year":"2014","unstructured":"Ishimatsu, T., et al.: Hazard analysis of complex spacecraft using systems-theoretic process analysis. J. Spacecr. Rocket. 51(2), 509\u2013522 (2014)","journal-title":"J. Spacecr. Rocket."},{"key":"23_CR5","unstructured":"ISO: ISO\/SAE FDIS 21434 Road vehicles - Cybersecurity engineering. https:\/\/www.iso.org\/standard\/70918.html. Accessed 08 June 2021"},{"key":"23_CR6","unstructured":"Kar, S.R.: Report of Method\u2019s application (2021). https:\/\/drive.google.com\/drive\/folders\/ 12c3TrLUy-xLpGQmw5zfVvUECnPtxC9h2. Accessed 08 June 2021"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-319-45477-1_11","volume-title":"Computer Safety, Reliability, and Security","author":"G Macher","year":"2016","unstructured":"Macher, G., Armengaud, E., Brenner, E., Kreiner, C.: A review of threat analysis and risk assessment methods in the automotive context. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 130\u2013141. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_11"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1016\/j.procs.2016.04.268","volume":"83","author":"G Macher","year":"2016","unstructured":"Macher, G., Armengaud, E., Brenner, E., Kreiner, C.: Threat and risk assessment methodologies in the automotive domain. Procedia Comput. Sci. 83, 1288\u20131294 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: Sahara: a security-aware hazard and risk analysis method. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 621\u2013624 (2015). https:\/\/doi.org\/10.7873\/DATE.2015.0622","DOI":"10.7873\/DATE.2015.0622"},{"key":"23_CR10","unstructured":"Microsoft: STRIDE (2009). https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN\/. Accessed 09 June 2021"},{"key":"23_CR11","unstructured":"O\u2019Neill, P.H.: How a \\$1 million plot to hack tesla failed (2020). https:\/\/www.technologyreview.com\/2020\/08\/28\/1007752\/how-a-1-million-plot-to-hack-tesla-failed\/. Accessed 08 June 2021"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Palin, R., Ward, D., Habli, I., Rivett, R.: ISO 26262 safety cases: compliance and assurance. In: 6th IET International Conference on System Safety 2011, pp. 1\u20136. IET (2011)","DOI":"10.1049\/cp.2011.0251"},{"key":"23_CR13","first-page":"190","volume":"190","author":"H Pentti","year":"2002","unstructured":"Pentti, H., Atte, H.: Failure mode and effects analysis of software-based automation systems. VTT Ind. Syst. STUK-YTO-TR 190, 190 (2002)","journal-title":"VTT Ind. Syst. STUK-YTO-TR"},{"key":"23_CR14","unstructured":"Ramaiah, B.S.M.P.S., Gokhale, A.A.: FMEA and fault tree based software safety analysis of a railroad crossing critical system. Glob. J. Comput. Sci. Technol. (2011)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Raspotnig, C., Katta, V., Karpati, P., Opdahl, A.L.: Enhancing chassis: a method for combining safety and security. In: 2013 International Conference on Availability, Reliability and Security, pp. 766\u2013773. IEEE (2013)","DOI":"10.1109\/ARES.2013.102"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-319-10506-2_21","volume-title":"Computer Safety, Reliability, and Security","author":"C Schmittner","year":"2014","unstructured":"Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 310\u2013325. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10506-2_21"},{"key":"23_CR17","unstructured":"SESAMO: D4.2 Integrated Design and Evaluation Methodology (2014). http:\/\/sesamo-project.eu\/content\/d42-integrated-design-and-evaluation-methodology. Accessed 08 June 2021"},{"key":"23_CR18","unstructured":"SESAMO: Security and Safety Modelling (2015). http:\/\/www.sesamo-project.eu\/. Accessed 08 June 2021"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"da Silva Amorim, S., Neto, F.S.S., McGregor, J.D., de Almeida, E.S., von Flach, G., Chavez, C.: How has the health of software ecosystems been evaluated?: a systematic review. In: Proceedings of the 31st Brazilian Symposium on Software Engineering, pp. 14\u201323. ACM (2017)","DOI":"10.1145\/3131151.3131174"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Stolte, T., Bagschik, G., Reschka, A., Maurer, M.: Hazard analysis and risk assessment for an automated unmanned protective vehicle. In: 2017 IEEE Intelligent Vehicles Symposium (IV), pp. 1848\u20131855. IEEE (2017)","DOI":"10.1109\/IVS.2017.7995974"},{"key":"23_CR21","unstructured":"Young, W., Porada, R.: System-theoretic process analysis for security (STPA-SEC): Cyber security and STPA. In: 2017 STAMP Conference (2017)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, S.E., Wang, J., Li, K., et al.: Influence of information flow topology on closed-loop stability of vehicle platoon with rigid formation. In: 17th International IEEE Conference on Intelligent Transportation Systems (ITSC), pp. 2094\u20132100. IEEE (2014)","DOI":"10.1109\/ITSC.2014.6958012"}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:05:46Z","timestamp":1642835146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}