{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:51:20Z","timestamp":1754599880133,"version":"3.40.3"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031686054"},{"type":"electronic","value":"9783031686061"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68606-1_2","type":"book-chapter","created":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:02:40Z","timestamp":1725836560000},"page":"18-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Failure Model Library for\u00a0Simulation-Based Validation of\u00a0Functional Safety"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1959-7803","authenticated-orcid":false,"given":"Tiziano","family":"Munaro","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2407-9304","authenticated-orcid":false,"given":"Irina","family":"Muntean","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5573-1201","authenticated-orcid":false,"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Aliabadi, M.R., Pattabiraman, K.: FIDL: a fault injection description language for compiler-based SFI tools. Comput. Saf., Reliab. Secur. 9922, 12\u201323 (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_2","DOI":"10.1007\/978-3-319-45477-1_2"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Amorim, T., et al.: Runtime safety assurance for adaptive cyber-physical systems: conserts M and ontology-based runtime reconfiguration applied to an automotive case study, pp. 137\u2013168. IGI Global (2017). https:\/\/doi.org\/10.4018\/978-1-5225-2845-6.ch006","DOI":"10.4018\/978-1-5225-2845-6.ch006"},{"issue":"2","key":"2_CR3","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/32.44380","volume":"16","author":"J Arlat","year":"1990","unstructured":"Arlat, J., et al.: Fault injection for dependability validation: a methodology and some applications. IEEE Trans. Softw. Eng. 16(2), 166\u2013182 (1990). https:\/\/doi.org\/10.1109\/32.44380","journal-title":"IEEE Trans. Softw. Eng."},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Bakker, T., Leccadito, M.T., Klenke, R.H.: Flexible FPGA based hardware in the loop simulator for control, fault-tolerant and cyber-physical systems. In: AIAA SciTech Forum - AIAA Aerospace Science Meeting. AIAA (2017). https:\/\/doi.org\/10.2514\/6.2017-0549","DOI":"10.2514\/6.2017-0549"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Banerjee, A., Maity, A., Gupta, S.K., Lamrani, I.: Statistical conformance checking of aviation cyber-physical systems by mining physics guided models. In: IEEE Aerospace Conference Proceedings, vol. 2023-March. IEEE Computer Society (2023). https:\/\/doi.org\/10.1109\/AERO55745.2023.10115613","DOI":"10.1109\/AERO55745.2023.10115613"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Bartocci, E., Mariani, L., Ni\u010dkovi\u0107, D., Yadav, D.: FIM: fault injection and mutation for simulink. In: 30th ACM Joint Euro Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2022, pp. 1716\u20131720. ACM, New York (2022). https:\/\/doi.org\/10.1145\/3540250.3558932","DOI":"10.1145\/3540250.3558932"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/s10009-023-00712-3","volume":"25","author":"J Baumeister","year":"2023","unstructured":"Baumeister, J., Dauer, J.C., Finkbeiner, B., Schirmer, S.: Monitoring with verified guarantees. Int. J. Softw. Tools Technol. Transf. 25(4), 593\u2013616 (2023). https:\/\/doi.org\/10.1007\/s10009-023-00712-3","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Ben\u00a0Hamouda, L., Ayadi, M., Langlois, N.: Fault tolerant fuzzy-based model predictive controllers for automotive application. In: International Conference on Control, Decision on Information Technology, CoDIT, pp. 117\u2013122. IEEE (2016). https:\/\/doi.org\/10.1109\/CoDIT.2016.7593546","DOI":"10.1109\/CoDIT.2016.7593546"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Bhatt, D., Schloegel, K., Madl, G., Oglesby, D.: Quantifying error propagation in data flow models. In: International Symposium and Workshop on Engineering of Computer Based Systems, pp. 2\u201311 (2013). https:\/\/doi.org\/10.1109\/ECBS.2013.7","DOI":"10.1109\/ECBS.2013.7"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/32.666826","volume":"24","author":"J Carreira","year":"1998","unstructured":"Carreira, J., Madeira, H., Silva, J.: Xception: a technique for the experimental evaluation of dependability in modern computers. IEEE Trans. Softw. Eng. 24, 125\u2013136 (1998). https:\/\/doi.org\/10.1109\/32.666826","journal-title":"IEEE Trans. Softw. Eng."},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Chen, W.D., Niu, B., Wang, H.Q., Li, H.T., Wang, D.: Adaptive event-triggered control for non-strict feedback nonlinear cpss with time delays against deception attacks and actuator faults. IEEE Trans. Autom. Sci. Eng. 1\u201311 (2023). https:\/\/doi.org\/10.1109\/TASE.2023.3292367","DOI":"10.1109\/TASE.2023.3292367"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Corradini, M.L., Monteri\u00f9, A., Orlando, G., Pettinari, S.: An actuator failure tolerant robust control approach for an underwater remotely operated vehicle. In: IEEE Conference on Decision and Control and European Control Conference, pp. 3934\u20133939 (2011). https:\/\/doi.org\/10.1109\/CDC.2011.6160578","DOI":"10.1109\/CDC.2011.6160578"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2013.54","volume":"11","author":"D Cotroneo","year":"2013","unstructured":"Cotroneo, D., Natella, R.: Fault injection for software certification. IEEE Secur. Priv. 11(4), 38\u201345 (2013). https:\/\/doi.org\/10.1109\/MSP.2013.54","journal-title":"IEEE Secur. Priv."},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Dietrich, C., Schmider, A., Pusz, O., Vay\u00e1, G.P., Lohmann, D.: Cross-layer fault-space pruning for hardware-assisted fault injection. In: ACM\/ESDA\/IEEE Design Automation Conference (DAC), pp.\u00a01\u20136 (2018). https:\/\/doi.org\/10.1109\/DAC.2018.8465787","DOI":"10.1109\/DAC.2018.8465787"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Edwards, J., Kashani, A., Iyer, G.: Evaluation of software vulnerabilities in vehicle electronic control units. In: 2017 IEEE Cybersecurity Development Conference, SecDev, pp. 83\u201384. IEEE (2017). https:\/\/doi.org\/10.1109\/SecDev.2017.26","DOI":"10.1109\/SecDev.2017.26"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Freeman, P., Balas, G.J.: Analytical fault detection for a small UAV. In: AIAA Infotech@Aerospace (I@A) Conference. American Institute of Aeronautics and Astronautics (2013). https:\/\/doi.org\/10.2514\/6.2013-5217","DOI":"10.2514\/6.2013-5217"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Ghosh, S.K., Jaffer\u00a0Sheriff, R., Jain, V., Dey, S.: Reliable and secure design-space-exploration for cyber-physical systems. ACM Trans. Embed. Comput. Syst. 19(3) (2020). https:\/\/doi.org\/10.1145\/3387927","DOI":"10.1145\/3387927"},{"key":"2_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/978-3-030-52243-8_39","volume-title":"Intelligent Computing","author":"NK Giri","year":"2020","unstructured":"Giri, N.K., Munir, A., Kong, J.: An integrated safe and secure approach for authentication and secret key establishment in automotive cyber-physical systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1230, pp. 545\u2013559. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52243-8_39"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Gohringer, D., Meder, L., Oey, O., Becker, J.: Reliable and adaptive network-on-chip architectures for cyber physical systems. Trans. Embed. Comput. Syst. 12 (2013). https:\/\/doi.org\/10.1145\/2435227.2435247","DOI":"10.1145\/2435227.2435247"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Guinebert, I., Barrilado, A., Delmas, K., Galti\u00e9, F., Pagetti, C.: Quality of fault injection strategies on hardware accelerator. In: Trapp, M., Saglietti, F., Spisl\u00e4nder, M., Bitsch, F. (eds.) Computer Safety, Reliability, and Security, pp. 222\u2013236. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14835-4_15","DOI":"10.1007\/978-3-031-14835-4_15"},{"issue":"5","key":"2_CR21","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/TC.2009.165","volume":"59","author":"O Hasan","year":"2010","unstructured":"Hasan, O., Tahar, S., Abbasi, N.: Formal reliability analysis using theorem proving. IEEE Trans. Comput. 59(5), 579\u2013592 (2010). https:\/\/doi.org\/10.1109\/TC.2009.165","journal-title":"IEEE Trans. Comput."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-45449-7_12","volume-title":"Embedded Software","author":"TA Henzinger","year":"2001","unstructured":"Henzinger, T.A., Horowitz, B., Kirsch, C.M.: Giotto: a time-triggered language for embedded programming. In: Henzinger, T.A., Kirsch, C.M. (eds.) EMSOFT 2001. LNCS, vol. 2211, pp. 166\u2013184. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45449-7_12"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-319-26844-6_28","volume-title":"Product-Focused Software Process Improvement","author":"D Holling","year":"2015","unstructured":"Holling, D., Fern\u00e1ndez, D.M., Pretschner, A.: A Field Study on the Elicitation and Classification of Defects for Defect Models. In: Abrahamsson, P., Corral, L., Oivo, M., Russo, B. (eds.) PROFES 2015. LNCS, vol. 9459, pp. 380\u2013396. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26844-6_28"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Holling, D., Pretschner, A., Gemmar, M.: 8cage. In: 29th ACM\/IEEE International Conference on Automated Software Engineering - ASE 2014. pp. 859\u2013862. ACM Press (2014). 10.1145\/2642937.2648622","DOI":"10.1145\/2642937.2648622"},{"issue":"4","key":"2_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/2.585157","volume":"30","author":"MC Hsueh","year":"1997","unstructured":"Hsueh, M.C., Tsai, T., Iyer, R.: Fault injection techniques and tools. Computer 30(4), 75\u201382 (1997). https:\/\/doi.org\/10.1109\/2.585157","journal-title":"Computer"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-031-40923-3_5","volume-title":"SAFECOMP 2023","author":"F Huang","year":"2023","unstructured":"Huang, F., Huang, B., Wang, Y., Wang, Y.: A taxonomy of software defect forms for certification tests in aviation industry. In: Guiochet, J., Tonetta, S., Bitsch, F. (eds.) SAFECOMP 2023. LNCS, vol. 14181, pp. 55\u201363. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40923-3_5"},{"issue":"3","key":"2_CR27","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TCST.2009.2026285","volume":"18","author":"I Hwang","year":"2010","unstructured":"Hwang, I., Kim, S., Kim, Y., Seah, C.E.: A survey of fault detection, isolation, and reconfiguration methods. IEEE Trans. Control Syst. Technol. 18(3), 636\u2013653 (2010). https:\/\/doi.org\/10.1109\/TCST.2009.2026285","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"2_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-30368-5","volume-title":"Fault-Diagnosis Systems: An Introduction From Fault Detection to Fault Tolerance","author":"R Isermann","year":"2006","unstructured":"Isermann, R.: Fault-Diagnosis Systems: An Introduction From Fault Detection to Fault Tolerance. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/3-540-30368-5"},{"key":"2_CR29","series-title":"ATZ\/MTZ-Fachbuch","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-662-49467-7_2","volume-title":"Combustion Engine Diagnosis","author":"R Isermann","year":"2017","unstructured":"Isermann, R.: Supervision, fault-detection and fault-diagnosis methods \u2013 a short introduction. In: Combustion Engine Diagnosis. A, pp. 25\u201347. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-49467-7_2"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-981-4585-36-1_13","volume":"540","author":"AH Khan","year":"2014","unstructured":"Khan, A.H., Khan, Z.H., Khan, S.H.: Optimized reconfigurable autopilot design for an aerospace CPS. Stud. Comput. Intell. 540, 381\u2013420 (2014). https:\/\/doi.org\/10.1007\/978-981-4585-36-1_13","journal-title":"Stud. Comput. Intell."},{"key":"2_CR31","doi-asserted-by":"publisher","unstructured":"Kukkala, V., Pasricha, S., Bradley, T.: JAMS-SG: a framework for jitter-aware message scheduling for time-triggered automotive networks. ACM Trans. Des. Autom. Electron. Syst. 24(6) (2019). https:\/\/doi.org\/10.1145\/3355392","DOI":"10.1145\/3355392"},{"key":"2_CR32","doi-asserted-by":"publisher","unstructured":"Lu, Q., Farahani, M., Wei, J., Thomas, A., Pattabiraman, K.: LLFI: an intermediate code-level fault injection tool for hardware faults. In: 2015 IEEE International Conference on Software Quality, Reliabilty and Security, pp. 11\u201316. IEEE (2015). https:\/\/doi.org\/10.1109\/QRS.2015.13","DOI":"10.1109\/QRS.2015.13"},{"issue":"5050","key":"2_CR33","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1126\/science.255.5050.1347","volume":"255","author":"E Marshall","year":"1992","unstructured":"Marshall, E.: Fatal error: how patriot overlooked a scud. Sci. 255(5050), 1347\u20131347 (1992). https:\/\/doi.org\/10.1126\/science.255.5050.1347","journal-title":"Sci."},{"key":"2_CR34","doi-asserted-by":"publisher","unstructured":"Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: 16th International Conference on WWW, pp. 667\u2013676. ACM (2007). https:\/\/doi.org\/10.1145\/1242572.1242663","DOI":"10.1145\/1242572.1242663"},{"issue":"9","key":"2_CR35","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TSE.2018.2811489","volume":"45","author":"R Matinnejad","year":"2019","unstructured":"Matinnejad, R., Nejati, S., Briand, L.C., Bruckmann, T.: Test generation and test prioritization for simulink models with dynamic behavior. IEEE Trans. Softw. Eng. 45(9), 919\u2013944 (2019). https:\/\/doi.org\/10.1109\/TSE.2018.2811489","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"2_CR36","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1109\/TRO.2005.851356","volume":"21","author":"M McIntyre","year":"2005","unstructured":"McIntyre, M., Dixon, W., Dawson, D., Walker, I.: Fault identification for robot manipulators. IEEE Trans. Robot. 21(5), 1028\u20131034 (2005). https:\/\/doi.org\/10.1109\/TRO.2005.851356","journal-title":"IEEE Trans. Robot."},{"key":"2_CR37","doi-asserted-by":"publisher","unstructured":"Meng, X., Tan, Q., Shao, Z., Zhang, N., Xu, J., Zhang, H.: Optimization methods for the fault injection tool SEInjector. In: International Conference on Information and Computer Technology (ICICT), pp. 31\u201335 (2018). https:\/\/doi.org\/10.1109\/INFOCT.2018.8356836","DOI":"10.1109\/INFOCT.2018.8356836"},{"issue":"4","key":"2_CR38","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.77","volume":"11","author":"S Mitra","year":"2013","unstructured":"Mitra, S., Wongpiromsarn, T., Murray, R.M.: Verifying cyber-physical interactions in safety-critical systems. IEEE Secur. Priv. 11(4), 28\u201337 (2013). https:\/\/doi.org\/10.1109\/MSP.2013.77","journal-title":"IEEE Secur. Priv."},{"key":"2_CR39","doi-asserted-by":"publisher","unstructured":"Moradi, M., Oakes, B.J., Saraoglu, M., Morozov, A., Janschek, K., Denil, J.: Exploring fault parameter space using reinforcement learning-based fault injection. In: Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN-W, pp. 102\u2013109. IEEE (2020). https:\/\/doi.org\/10.1109\/DSN-W50199.2020.00028","DOI":"10.1109\/DSN-W50199.2020.00028"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-030-23703-5_4","volume-title":"Cyber Physical Systems. Model-Based Design","author":"M Moradi","year":"2019","unstructured":"Moradi, M., Van Acker, B., Vanherpen, K., Denil, J.: Model-implemented hybrid fault injection for simulink (tool demonstrations). In: Chamberlain, R., Taha, W., T\u00f6rngren, M. (eds.) CyPhy\/WESE -2018. LNCS, vol. 11615, pp. 71\u201390. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23703-5_4"},{"key":"2_CR41","doi-asserted-by":"publisher","unstructured":"Offutt, J., Alexander, R., Wu, Y., Xiao, Q., Hutchinson, C.: A fault model for subtype inheritance and polymorphism. In: 12th International Symposium on Software Reliabilty Engineering, pp. 84\u201393. IEEE (2001). https:\/\/doi.org\/10.1109\/ISSRE.2001.989461","DOI":"10.1109\/ISSRE.2001.989461"},{"key":"2_CR42","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.procs.2020.10.062","volume":"177","author":"R Oucheikh","year":"2020","unstructured":"Oucheikh, R., Fri, M., Fedouaki, F., Hain, M.: Deep real-time anomaly detection for connected autonomous vehicles. Procedia Comp. Sci. 177, 456\u2013461 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.10.062","journal-title":"Procedia Comp. Sci."},{"key":"2_CR43","doi-asserted-by":"publisher","unstructured":"Park, H., Easwaran, A., Andalam, S.: TiLA: Twin-in-the-loop architecture for cyber-physical production systems. In: IEEE International Conference on Computer Design, ICCD, pp. 82\u201390. IEEE (2019). https:\/\/doi.org\/10.1109\/ICCD46524.2019.00019","DOI":"10.1109\/ICCD46524.2019.00019"},{"key":"2_CR44","doi-asserted-by":"publisher","unstructured":"Peth\u0151, Z., Szalay, Z., T\u00f6r\u00f6k, A.: Safety risk focused analysis of V2V communication especially considering cyberattack sensitive network performance and vehicle dynamics factors. Veh. Commun. 37 (2022). https:\/\/doi.org\/10.1016\/j.vehcom.2022.100514","DOI":"10.1016\/j.vehcom.2022.100514"},{"key":"2_CR45","doi-asserted-by":"publisher","unstructured":"Pill, I., Rubil, I., Wotawa, F., Nica, M.: SIMULTATE: a toolset for fault injection and mutation testing of simulink models. In: IEEE International Conference on Software Testing, V &V Workshops (ICSTW), pp. 168\u2013173 (2016). https:\/\/doi.org\/10.1109\/ICSTW.2016.21","DOI":"10.1109\/ICSTW.2016.21"},{"key":"2_CR46","doi-asserted-by":"publisher","unstructured":"Poudel, B., Munir, A.: Design and evaluation of a novel ecu architecture for secure and dependable automotive cps. In: 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, pp. 841\u2013847 (2017). https:\/\/doi.org\/10.1109\/CCNC.2017.7983243","DOI":"10.1109\/CCNC.2017.7983243"},{"key":"2_CR47","doi-asserted-by":"publisher","unstructured":"Pretschner, A.: Defect-based testing. Dependable Softw. Syst. Eng. 224\u2013245 (2015). https:\/\/doi.org\/10.3233\/978-1-61499-495-4-224","DOI":"10.3233\/978-1-61499-495-4-224"},{"key":"2_CR48","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/3379106.3379113","volume":"39","author":"S Procter","year":"2020","unstructured":"Procter, S., Feiler, P.: The AADL error library. ACM SIGAda Ada Lett. 39, 63\u201370 (2020). https:\/\/doi.org\/10.1145\/3379106.3379113","journal-title":"ACM SIGAda Ada Lett."},{"key":"2_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-24249-1_9","volume-title":"Computer Safety, Reliability, and Security","author":"S Procter","year":"2015","unstructured":"Procter, S., Hatcliff, J., Weininger, S., Fernando, A.: Error type refinement for assurance of families of\u00a0platform-based systems. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 95\u2013106. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24249-1_9"},{"key":"2_CR50","doi-asserted-by":"publisher","unstructured":"Qutub, S., et al.: Hardware faults that matter: understanding and estimating the safety impact of hardware faults on object detection DNNs. In: Trapp, M., Saglietti, F., Spisl\u00e4nder, M., Bitsch, F. (eds.) Computer Safety, Reliability, and Security, pp. 298\u2013318. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14835-4_20","DOI":"10.1007\/978-3-031-14835-4_20"},{"issue":"5","key":"2_CR51","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCS.2017.2718825","volume":"37","author":"Y Rahman","year":"2017","unstructured":"Rahman, Y., Xie, A., Bernstein, D.S.: Retrospective cost adaptive control: pole placement, frequency response, and connections with LQG control. IEEE Control. Syst. 37(5), 28\u201369 (2017). https:\/\/doi.org\/10.1109\/MCS.2017.2718825","journal-title":"IEEE Control. Syst."},{"key":"2_CR52","doi-asserted-by":"publisher","unstructured":"da\u00a0Rosa, F.R., Garibotti, R., Ost, L., Reis, R.: Using machine learning techniques to evaluate multicore soft error reliability. IEEE Trans. Circuits and Syst. I: Regular Papers 66(6), 2151\u20132164 (2019). https:\/\/doi.org\/10.1109\/TCSI.2019.2906155","DOI":"10.1109\/TCSI.2019.2906155"},{"issue":"1","key":"2_CR53","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/JPROC.2017.2779456","volume":"106","author":"D Roy","year":"2018","unstructured":"Roy, D., Zhang, L., Chang, W., Mitter, S.K., Chakraborty, S.: Semantics-preserving cosynthesis of cyber-physical systems. Proc. IEEE 106(1), 171\u2013200 (2018). https:\/\/doi.org\/10.1109\/JPROC.2017.2779456","journal-title":"Proc. IEEE"},{"key":"2_CR54","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.paerosci.2017.10.002","volume":"95","author":"R Sabatini","year":"2017","unstructured":"Sabatini, R., Moore, T., Ramasamy, S.: Global navigation satellite systems performance analysis and augmentation strategies in aviation. Prog. Aerosp. Sci. 95, 45\u201398 (2017). https:\/\/doi.org\/10.1016\/j.paerosci.2017.10.002","journal-title":"Prog. Aerosp. Sci."},{"key":"2_CR55","doi-asserted-by":"publisher","unstructured":"Sahoo, S.K., Li, M.L., Ramachandran, P., Adve, S.V., Adve, V.S., Zhou, Y.: Using likely program invariants to detect hardware errors. In: IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp. 70\u201379 (2008). https:\/\/doi.org\/10.1109\/DSN.2008.4630072","DOI":"10.1109\/DSN.2008.4630072"},{"key":"2_CR56","doi-asserted-by":"publisher","unstructured":"Sauer, M., et al.: An FPGA-based framework for run-time injection and analysis of soft errors in microprocessors. In: 2011 IEEE 17th International On-Line Testing Symposium, IOLTS 2011, pp. 182\u2013185 (2011). https:\/\/doi.org\/10.1109\/IOLTS.2011.5993836","DOI":"10.1109\/IOLTS.2011.5993836"},{"key":"2_CR57","doi-asserted-by":"publisher","unstructured":"Scoggin, J., Selmic, R., Oonk, S., Vosburg, N., Maldonado, F.: Sensor networks faults detection and identification: models and software development. In: AIAA Infotech@Aerospace (I@A) Conference. American Institute of Aeronautics and Astronautics (2013). https:\/\/doi.org\/10.2514\/6.2013-5140","DOI":"10.2514\/6.2013-5140"},{"key":"2_CR58","doi-asserted-by":"publisher","unstructured":"Sini, J., Violante, M.: An automatic approach to perform FMEDA safety assessment on hardware designs. In: 2018 IEEE 24th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 49\u201352. IEEE (2018). https:\/\/doi.org\/10.1109\/IOLTS.2018.8474217","DOI":"10.1109\/IOLTS.2018.8474217"},{"issue":"5","key":"2_CR59","doi-asserted-by":"publisher","first-page":"3109","DOI":"10.1007\/s00158-021-03002-1","volume":"64","author":"H Son","year":"2021","unstructured":"Son, H., Youn, B.D., Kim, T.: Model improvement with experimental design for identifying error sources in a computational model. Struct. Multidiscip. Optim. 64(5), 3109\u20133122 (2021). https:\/\/doi.org\/10.1007\/s00158-021-03002-1","journal-title":"Struct. Multidiscip. Optim."},{"key":"2_CR60","doi-asserted-by":"publisher","unstructured":"Starke, A., Kumar, D., Ford, M., McNair, J., Bell, A.: A test bed study of network determinism for heterogeneous traffic using time-triggered ethernet. In: IEEE Military Communications Conference MILCOM, vol. 2017-October, pp. 611\u2013616. IEEE (2017). https:\/\/doi.org\/10.1109\/MILCOM.2017.8170786","DOI":"10.1109\/MILCOM.2017.8170786"},{"key":"2_CR61","doi-asserted-by":"publisher","unstructured":"Steiner, W., Rushby, J.: TTA and PALS: formally verified design patterns for distributed cyber-physical systems. In: AIAA IEEE Digital Avionics Systems Conference, pp. 7B51\u20137B515 (2011). https:\/\/doi.org\/10.1109\/DASC.2011.6096120","DOI":"10.1109\/DASC.2011.6096120"},{"key":"2_CR62","doi-asserted-by":"publisher","unstructured":"Stott, E.A., Wong, J.S., Sedcole, P., Cheung, P.Y.: Degradation in FPGAs: measurement and modelling. In: 18th Annual ACM\/SIGDA International Symposium on FPGAs, FPGA \u201910, pp. 229\u2013238. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1723112.1723152","DOI":"10.1145\/1723112.1723152"},{"key":"2_CR63","doi-asserted-by":"crossref","unstructured":"Struss, P.: Model-based analysis of embedded systems: placing it upon its feet instead of on its head: an outsider\u2019s view. In: ICSOFT - International Joint Conference on Software Technologies, pp. 284\u2013291 (2013)","DOI":"10.5220\/0004596102840291"},{"issue":"6","key":"2_CR64","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1017\/S037346331400037X","volume":"67","author":"B Syd Ali","year":"2014","unstructured":"Syd Ali, B., Ochieng, W., Majumdar, A., Schuster, W., Kian Chiew, T.: ADS-B system failure modes and models. J. Navig. 67(6), 995\u20131017 (2014). https:\/\/doi.org\/10.1017\/S037346331400037X","journal-title":"J. Navig."},{"key":"2_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-45480-1_12","volume-title":"Computer Safety, Reliability, and Security","author":"B-A Tabacaru","year":"2016","unstructured":"Tabacaru, B.-A., Chaari, M., Ecker, W., Kruse, T., Novello, C.: Gate-level-accurate fault-effect analysis at virtual-prototype speed. In: Skavhaug, A., Guiochet, J., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9923, pp. 144\u2013156. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45480-1_12"},{"key":"2_CR66","doi-asserted-by":"publisher","unstructured":"Templier, M., Par\u00e9, G.: A framework for guiding and evaluating literature reviews. Commun. Assoc. Inf. Syst. 37, 112\u2013137 (2015). https:\/\/doi.org\/10.17705\/1CAIS.03706","DOI":"10.17705\/1CAIS.03706"},{"key":"2_CR67","doi-asserted-by":"publisher","unstructured":"Thomas, T.M., Dietrich, C., Pusz, O., Lohmann, D.: ACTOR: accelerating fault injection campaigns using timeout detection based on autocorrelation. In: Trapp, M., Saglietti, F., Spisl\u00e4nder, M., Bitsch, F. (eds.) Computer Safety, Reliability, and Security, pp. 252\u2013266. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14835-4_17","DOI":"10.1007\/978-3-031-14835-4_17"},{"key":"2_CR68","doi-asserted-by":"publisher","unstructured":"Uriagereka, G.J., Lattarulo, R., Rastelli, J.P., Calonge, E.A., Lopez, A.R., Ortiz, H.E.: Fault injection method for safety and controllability evaluation of automated driving. In: 2017 IEEE Intelligent Vehicle Symposium (IV), pp. 1867\u20131872. IEEE (2017). https:\/\/doi.org\/10.1109\/IVS.2017.7995977","DOI":"10.1109\/IVS.2017.7995977"},{"key":"2_CR69","doi-asserted-by":"publisher","unstructured":"Vatanparvar, K., Al\u00a0Faruque, M.A.: Self-secured control with anomaly detection and recovery in automotive cyber-physical systems. In: Design Automation and Test in Europe Conference and Exhibition, DATE 2019, pp. 788\u2013793 (2019). https:\/\/doi.org\/10.23919\/DATE.2019.8714833","DOI":"10.23919\/DATE.2019.8714833"},{"key":"2_CR70","doi-asserted-by":"publisher","unstructured":"Xu, X., Li, M.L.: Understanding soft error propagation using efficient vulnerability-driven fault injection. In: IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1\u201312 (2012). https:\/\/doi.org\/10.1109\/DSN.2012.6263923","DOI":"10.1109\/DSN.2012.6263923"},{"key":"2_CR71","doi-asserted-by":"publisher","unstructured":"Yiu, C.Y., et al.: A digital twin-based platform towards intelligent automation with virtual counterparts of flight and air traffic control operations. Appl. Sci. (Switz.) 11(22) (2021). https:\/\/doi.org\/10.3390\/app112210923","DOI":"10.3390\/app112210923"},{"key":"2_CR72","doi-asserted-by":"publisher","unstructured":"Zampetti, F., Kapur, R., Di\u00a0Penta, M., Panichella, S.: An empirical characterization of software bugs in open-source Cyber-Physical Systems. J. Syst. Softw. 192 (2022). https:\/\/doi.org\/10.1016\/j.jss.2022.111425","DOI":"10.1016\/j.jss.2022.111425"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68606-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:03:54Z","timestamp":1725836634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68606-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031686054","9783031686061"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68606-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Florence","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"43","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.safecomp2024.unifi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}