{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:27:53Z","timestamp":1759336073651,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032057914","type":"print"},{"value":"9783032057921","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05792-1_14","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T10:31:31Z","timestamp":1759314691000},"page":"256-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Fault Trees: the\u00a0Fast and\u00a0the\u00a0Formal"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3235-5952","authenticated-orcid":false,"given":"Thi Kim Nhung","family":"Dang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3510-4325","authenticated-orcid":false,"given":"Benedikt","family":"Peterseim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5687-854X","authenticated-orcid":false,"given":"Milan","family":"Lopuha\u00e4-Zwakenberg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6793-8165","authenticated-orcid":false,"given":"Mari\u00eblle","family":"Stoelinga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Barros, L.C., Bassanezi, R.C., Lodwick, W.A.: The extension principle of Zadeh and fuzzy numbers. In: Barros, L.C., Bassanezi, R.C., Lodwick, W.A. (eds.) A First Course in Fuzzy Logic, Fuzzy Dynamical Systems, and Biomathematics. SFSC, vol. 347, pp. 23\u201341. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-53324-6_2","DOI":"10.1007\/978-3-662-53324-6_2"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Basg\u00f6ze, D., Volk, M., Katoen, J.P., Khan, S., Stoelinga, M.: BDDs strike back: efficient analysis of static and dynamic fault trees. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NFM 2022. LNCS, vol. 13260, pp. 713\u2013732. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_38","DOI":"10.1007\/978-3-031-06773-0_38"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Basg\u00f6ze, D., Volk, M., Katoen, J.P., Khan, S., Stoelinga, M.: Artifact for \u201cBDDs Strike Back - Efficient Analysis of Static and Dynamic Fault Trees\u201d. Zenodo (2022)","DOI":"10.1007\/978-3-031-06773-0_38"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Basiura, B., et al.: Fuzzy numbers, pp. 1\u201326. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-26494-3_1"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1109\/5.364489","volume":"83","author":"JB Bowles","year":"1995","unstructured":"Bowles, J.B., Pelaez, C.E.: Application of fuzzy logic to reliability engineering. Proc. IEEE 83(3), 435\u2013449 (1995)","journal-title":"Proc. IEEE"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCI.2018.2881642","volume":"14","author":"I Couso","year":"2019","unstructured":"Couso, I., Borgelt, C., Hullermeier, E., Kruse, R.: Fuzzy sets in data analysis: from statistical foundations to machine learning. IEEE Comput. Intell. Mag. 14(1), 31\u201344 (2019)","journal-title":"IEEE Comput. Intell. Mag."},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Dang, T.K.N.: Artefact for \u201cfuzzy fault trees: the fast and the formal\u201d (2025). https:\/\/doi.org\/10.5281\/zenodo.15337097","DOI":"10.5281\/zenodo.15337097"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-031-57259-3_10","volume-title":"Fundamental Approaches to Software Engineering","author":"TKN Dang","year":"2024","unstructured":"Dang, T.K.N., Lopuha\u00e4-Zwakenberg, M., Stoelinga, M.: Fuzzy quantitative attack tree analysis. In: Beyer, D., Cavalcanti, A. (eds.) FASE 2024. LNCS, vol. 14573, pp. 210\u2013231. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57259-3_10"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Dang, T.K.N., Peterseim, B., Lopuha\u00e4-Zwakenberg, M., Stoelinga, M.: Extended version (with appednix) of \u201cFuzzy fault trees: the fast and the formal\u201d (2025). https:\/\/doi.org\/10.5281\/zenodo.15720558","DOI":"10.5281\/zenodo.15720558"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/0022-247X(83)90253-6","volume":"92","author":"J Dijkman","year":"1983","unstructured":"Dijkman, J., Van Haeringen, H., De Lange, S.: Fuzzy numbers. J. Math. Anal. Appl. 92(2), 301\u2013341 (1983)","journal-title":"J. Math. Anal. Appl."},{"issue":"6","key":"14_CR11","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1080\/00207727808941724","volume":"9","author":"D Dubois","year":"1978","unstructured":"Dubois, D., Prade, H.: Operations on fuzzy numbers. Int. J. Syst. Sci. 9(6), 613\u2013626 (1978)","journal-title":"Int. J. Syst. Sci."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10009-021-00633-z","volume":"24","author":"C Hensel","year":"2022","unstructured":"Hensel, C., Sebastian, J., Katoen, J.P., Quatmann, T., Volk, M.: The probabilistic model checker storm. Int. J. Softw. Tools Technol. Transfer 24, 589\u2013610 (2022)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-23963-2_17","volume-title":"Scalable Uncertainty Management","author":"C Jacob","year":"2011","unstructured":"Jacob, C., Dubois, D., Cardoso, J.: Uncertainty handling in quantitative BDD-based fault-tree analysis by interval computation. In: Benferhat, S., Grant, J. (eds.) SUM 2011. LNCS (LNAI), vol. 6929, pp. 205\u2013218. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23963-2_17"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-642-33362-0_40","volume-title":"Scalable Uncertainty Management","author":"C Jacob","year":"2012","unstructured":"Jacob, C., Dubois, D., Cardoso, J.: From imprecise probability laws to fault tree analysis. In: H\u00fcllermeier, E., Link, S., Fober, T., Seeger, B. (eds.) SUM 2012. LNCS (LNAI), vol. 7520, pp. 525\u2013538. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33362-0_40"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Jezewski, M., Czabanski, R., Leski, J.: Introduction to fuzzy sets. In: Prokopowicz, P., Czerniak, J., Miko\u0142ajewski, D., Apiecionek, \u0141., \u015al\u0229zak, D. (eds.) Theory and Applications of Ordered Fuzzy Numbers. Studies in Fuzziness and Soft Computing, vol. 356, pp. 3\u201322. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59614-3_1","DOI":"10.1007\/978-3-319-59614-3_1"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.eswa.2017.01.058","volume":"77","author":"S Kabir","year":"2017","unstructured":"Kabir, S.: An overview of fault tree analysis and its application in model based dependability analysis. Expert Syst. Appl. 77, 114\u2013135 (2017)","journal-title":"Expert Syst. Appl."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"109199","DOI":"10.1016\/j.asoc.2022.109199","volume":"125","author":"M Kumar","year":"2022","unstructured":"Kumar, M., Singh, K.: Fuzzy fault tree analysis of chlorine gas release hazard in chlor-alkali industry using alpha-cut interval-based similarity aggregation method. Appl. Soft Comput. 125, 109199 (2022)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/0026-2714(93)90326-T","volume":"33","author":"GS Liang","year":"1993","unstructured":"Liang, G.S., Wang, M.J.J.: Fuzzy fault-tree analysis using failure possibility. Microelectron. Reliab. 33(4), 583\u2013597 (1993)","journal-title":"Microelectron. Reliab."},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S0951-8320(97)00072-0","volume":"58","author":"CT Lin","year":"1997","unstructured":"Lin, C.T., Wang, M.J.J.: Hybrid fault tree analysis using fuzzy sets. Reliabil. Eng. Syst. Saf. 58(3), 205\u2013213 (1997)","journal-title":"Reliabil. Eng. Syst. Saf."},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Lopuha\u00e4-Zwakenberg, M., Stoelinga, M.: Attack time analysis in dynamic attack trees via integer linear programming. In: Ferreira, C., Willemse, T.A.C. (eds.) SEFM 2023. LNCS, vol. 14323, pp. 165\u2013183. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-47115-5_10","DOI":"10.1007\/978-3-031-47115-5_10"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Lopuha\u00e4-Zwakenberg, M.: Fault tree reliability analysis via squarefree polynomials (2023)","DOI":"10.5220\/0012334000003645"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s13198-013-0145-x","volume":"4","author":"YA Mahmood","year":"2013","unstructured":"Mahmood, Y.A., Ahmadi, A., Verma, A.K., Srividya, A., Kumar, U.: Fuzzy fault tree analysis: a review of concept and application. Int. J. Syst. Assur. Eng. Manage. 4, 19\u201332 (2013)","journal-title":"Int. J. Syst. Assur. Eng. Manage."},{"issue":"2","key":"14_CR23","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.oceaneng.2010.11.003","volume":"38","author":"A Mentes","year":"2011","unstructured":"Mentes, A., Helvacioglu, I.H.: An application of fuzzy fault tree analysis for spread mooring systems. Ocean Eng. 38(2), 285\u2013294 (2011)","journal-title":"Ocean Eng."},{"issue":"2","key":"14_CR24","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/0022-247X(78)90045-8","volume":"64","author":"HT Nguyen","year":"1978","unstructured":"Nguyen, H.T.: A note on the extension principle for fuzzy sets. J. Math. Anal. Appl. 64(2), 369\u2013380 (1978)","journal-title":"J. Math. Anal. Appl."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Pan, N.F., Wang, H.: Assessing failure of bridge construction using fuzzy fault tree analysis. In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), vol.\u00a01, pp. 96\u2013100. IEEE (2007)","DOI":"10.1109\/FSKD.2007.193"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Peng, Z., Xiaodong, M., Zongrun, Y., Zhaoxiang, Y.: An approach of fault diagnosis for system based on fuzzy fault tree. In: Proceedings of the 2008 International Conference on MultiMedia and Information Technology, MMIT 2008, pp. 697\u2013700. IEEE Computer Society, USA (2009)","DOI":"10.1109\/MMIT.2008.142"},{"issue":"2","key":"14_CR27","doi-asserted-by":"publisher","first-page":"04020015","DOI":"10.1061\/(ASCE)NH.1527-6996.0000360","volume":"21","author":"S Prabhu","year":"2020","unstructured":"Prabhu, S., Ehrett, C., Javanbarg, M., Brown, D.A., Lehmann, M., Atamturktur, S.: Uncertainty quantification in fault tree analysis: estimating business interruption due to seismic hazard. Nat. Hazard. Rev. 21(2), 04020015 (2020)","journal-title":"Nat. Hazard. Rev."},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"R.\u00a0Sadiq, E.S.M., Kleiner, Y.: Predicting risk of water quality failures in distribution networks under uncertainties using fault-tree analysis. Urban Water J. 5(4), 287\u2013304 (2008)","DOI":"10.1080\/15730620802213504"},{"issue":"3","key":"14_CR29","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/0951-8320(93)90060-C","volume":"40","author":"A Rauzy","year":"1993","unstructured":"Rauzy, A.: New algorithms for fault trees analysis. Reliabi. Eng. Syst. Saf. 40(3), 203\u2013211 (1993)","journal-title":"Reliabi. Eng. Syst. Saf."},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.cosrev.2015.03.001","volume":"15\u201316","author":"E Ruijters","year":"2015","unstructured":"Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15\u201316, 29\u201362 (2015)","journal-title":"Comput. Sci. Rev."},{"issue":"5","key":"14_CR31","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TR.1985.5222232","volume":"34","author":"AM Rushdi","year":"1985","unstructured":"Rushdi, A.M.: Uncertainty analysis of fault-tree outputs. IEEE Trans. Reliab. 34(5), 458\u2013462 (1985)","journal-title":"IEEE Trans. Reliab."},{"issue":"12","key":"14_CR32","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1016\/j.microrel.2006.01.007","volume":"46","author":"MH Shu","year":"2006","unstructured":"Shu, M.H., Cheng, C.H., Chang, J.R.: Using intuitionistic fuzzy sets for fault-tree analysis on printed circuit board assembly. Microelectron. Reliab. 46(12), 2139\u20132148 (2006)","journal-title":"Microelectron. Reliab."},{"key":"14_CR33","unstructured":"Stamatelatos, M., Vesely, W., Dugan, J., Fragola, J., Minarick, J., Railsback, J.: Fault tree handbook with aerospace applications. NASA, Washington, DC (2002)"},{"key":"14_CR34","volume-title":"Concise Guide to Fault Tree Analysis: Models, Methods and Algorithms","author":"M Stoelinga","year":"2025","unstructured":"Stoelinga, M., Ruijters, E., Kr\u010d\u00e1l, P.: Concise Guide to Fault Tree Analysis: Models, Methods and Algorithms. Springer, Cham (2025)"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Tanaka, H., Fan, L.T., Lai, F.S., Toguchi, K.: Fault-tree analysis by fuzzy probability. IEEE Trans. Reliabil. R-32(5), 453\u2013457 (1983)","DOI":"10.1109\/TR.1983.5221727"},{"issue":"4","key":"14_CR36","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1080\/02630258508970407","volume":"2","author":"WM Dong","year":"1985","unstructured":"Dong, W.M., Shah, H.C., Wongt, F.S.: Fuzzy computations in risk and decision analysis. Civ. Eng. Syst. 2(4), 201\u2013208 (1985)","journal-title":"Civ. Eng. Syst."},{"key":"14_CR37","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.psep.2019.09.003","volume":"131","author":"M Yazdi","year":"2019","unstructured":"Yazdi, M., Kabir, S., Walker, M.: Uncertainty handling in fault tree based risk assessment: state of the art and future perspectives. Process Saf. Environ. Prot. 131, 89\u2013104 (2019)","journal-title":"Process Saf. Environ. Prot."},{"key":"14_CR38","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1007\/s13198-017-0583-y","volume":"8","author":"M Yazdi","year":"2017","unstructured":"Yazdi, M., Nikfar, F., Nasrabadi, M.: Failure probability analysis by employing fuzzy fault tree analysis. Int. J. Syst. Assur. Eng. Manag. 8, 1177\u20131193 (2017)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"2","key":"14_CR39","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jlp.2004.12.003","volume":"18","author":"D Yuhua","year":"2005","unstructured":"Yuhua, D., Datao, Y.: Estimation of failure probability of oil and gas transmission pipelines by fuzzy fault tree analysis. J. Loss Prev. Process Ind. 18(2), 83\u201388 (2005)","journal-title":"J. Loss Prev. Process Ind."},{"issue":"3","key":"14_CR40","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L Zadeh","year":"1965","unstructured":"Zadeh, L.: Fuzzy sets. Inf. Control 8(3), 338\u2013353 (1965)","journal-title":"Inf. Control"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05792-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T10:31:36Z","timestamp":1759314696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05792-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032057914","9783032057921"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05792-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QEST+FORMATS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aarhus","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"qest2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.qest-formats.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}