{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:29:48Z","timestamp":1768408188264,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031409226","type":"print"},{"value":"9783031409233","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40923-3_9","type":"book-chapter","created":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T23:02:21Z","timestamp":1694386941000},"page":"107-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Model-Based Generation of\u00a0Attack-Fault Trees"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8744-9203","authenticated-orcid":false,"given":"Raffaela","family":"Groner","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5391-7419","authenticated-orcid":false,"given":"Thomas","family":"Witte","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6088-8393","authenticated-orcid":false,"given":"Alexander","family":"Raschke","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Hirn","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0706-3202","authenticated-orcid":false,"given":"Irdin","family":"Pekaric","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Frick","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9067-3748","authenticated-orcid":false,"given":"Matthias","family":"Tichy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3818-4442","authenticated-orcid":false,"given":"Michael","family":"Felderer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,11]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.3233\/FI-2021-2066","volume":"182","author":"\u00c9 Andr\u00e9","year":"2021","unstructured":"Andr\u00e9, \u00c9., Lime, D., Ramparison, M., Stoelinga, M.: Parametric analyses of attack-fault trees. Fund. Inform. 182, 69\u201394 (2021). https:\/\/doi.org\/10.3233\/FI-2021-2066","journal-title":"Fund. Inform."},{"key":"9_CR2","unstructured":"CAPEC-94: Adversary in the Middle (AiTM). https:\/\/capec.mitre.org\/data\/definitions\/94.html. Accessed 13 Feb 2023"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/24.159800","volume":"41","author":"J Dugan","year":"1992","unstructured":"Dugan, J., Bavuso, S., Boyd, M.: Dynamic fault-tree models for fault-tolerant computer systems. IEEE Trans. Reliab. 41(3), 363\u2013377 (1992). https:\/\/doi.org\/10.1109\/24.159800","journal-title":"IEEE Trans. Reliab."},{"key":"9_CR4","unstructured":"Gherardi, L.: Variability modeling and resolution in component-based robotics systems. Ph.D. thesis (2013)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11875567_12","volume-title":"Computer Safety, Reliability, and Security","author":"H Giese","year":"2006","unstructured":"Giese, H., Tichy, M.: Component-based hazard analysis: optimal designs, product lines, and online-reconfiguration. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 156\u2013169. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11875567_12"},{"key":"9_CR6","unstructured":"Kotenko, I., Chechulin, A.: A cyber attack modeling and impact assessment framework. In: CYCON 2013, pp. 1\u201324 (2013)"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Kumar, R., Stoelinga, M.: Quantitative security and safety analysis with attack-fault trees. In: HASE 2017, pp. 25\u201332 (2017). https:\/\/doi.org\/10.1109\/HASE.2017.12","DOI":"10.1109\/HASE.2017.12"},{"key":"9_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219","volume":"35","author":"HS Lallie","year":"2020","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35, 100219 (2020)","journal-title":"Comput. Sci. Rev."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Macenski, S., Foote, T., Gerkey, B., Lalancette, C., Woodall, W.: Robot operating system 2: design, architecture, and uses in the wild. Sci. Robot. 7(66), eabm6074 (2022)","DOI":"10.1126\/scirobotics.abm6074"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11734727_17"},{"issue":"9","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"I Nai Fovino","year":"2009","unstructured":"Nai Fovino, I., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9), 1394\u20131402 (2009). https:\/\/doi.org\/10.1016\/j.ress.2009.02.020","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: 13th ACM Conference on Computer and Communications Security. CCS \u201906, pp. 336\u2013345. Association for Computing Machinery, New York, NY, USA (2006). https:\/\/doi.org\/10.1145\/1180405.1180446","DOI":"10.1145\/1180405.1180446"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Pekaric, I., Felderer, M., Steinm\u00fcller, P.: VULNERLIZER: cross-analysis between vulnerabilities and software libraries. In: HICSS, pp. 1\u201310 (2021)","DOI":"10.24251\/HICSS.2021.843"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Pekaric, I., et al.: A Systematic Review on Security and Safety of Self-Adaptive Systems (2022). https:\/\/dx.doi.org\/11.2139\/ssrn.4029617, preprint at SSRN","DOI":"10.2139\/ssrn.4029617"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.cosrev.2015.03.001","volume":"15\u201316","author":"E Ruijters","year":"2015","unstructured":"Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15\u201316, 29\u201362 (2015). https:\/\/doi.org\/10.1016\/j.cosrev.2015.03.001","journal-title":"Comput. Sci. Rev."},{"key":"9_CR16","unstructured":"Samonas, S., Coss, D.: The CIA strikes back: Redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10(3) (2014)"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.cose.2018.12.011","volume":"82","author":"C Sauerwein","year":"2019","unstructured":"Sauerwein, C., Pekaric, I., Felderer, M., Breu, R.: An analysis and classification of public information security data sources used in research and practice. Comput. Secur. 82, 140\u2013155 (2019)","journal-title":"Comput. Secur."},{"key":"9_CR18","unstructured":"Schneier, B.: Modeling security threats. Dr. Dobb\u2019s J. 24(12) (1999)"},{"key":"9_CR19","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: SAFECOMP 2013. Workshops and Tutorials: CARS, SASSUR, DECS, ASCOMS (2013)"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: DISCEX\u201901, vol. 2, pp. 307\u2013321 (2001). https:\/\/doi.org\/10.1109\/DISCEX.2001.932182","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"9_CR21","unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook. Technical report, Nuclear Regulatory Commission Washington DC (1981)"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Witte, T., Groner, R., Raschke, A., Tichy, M., Pekaric, I., Felderer, M.: Towards model co-evolution across self-adaptation steps for combined safety and security analysis. In: SEAMS 2022, pp. 106\u2013112 (2022). https:\/\/doi.org\/10.1145\/3524844.3528062","DOI":"10.1145\/3524844.3528062"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40923-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T18:19:42Z","timestamp":1709835582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40923-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031409226","9783031409233"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40923-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"42","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2023.cnrs.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops, 35 out of 49 papers have been accepted","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}