{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:37:31Z","timestamp":1767137851502,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319070759","type":"print"},{"value":"9783319070766","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07076-6_8","type":"book-chapter","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T01:42:43Z","timestamp":1404870163000},"page":"109-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Integration of Compositional Risk Analysis Using Monte Carlo Simulation and Security Testing"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Viehmann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,10]]},"reference":[{"key":"8_CR1","unstructured":"International Organization for Standardization: ISO 31000 Risk Management \u2013 Principles and Guidelines (2009)"},{"key":"8_CR2","unstructured":"International Organization for Standardization: ISO Guide 73 Risk Management \u2013 Vocabulary (2009)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1142\/S0218539394000362","volume":"1","author":"A Bouti","year":"1994","unstructured":"Bouti, A., Kadi, D.A.: A state-of-the-art review of FMEA\/FMECA. Int. J. Reliab. Qual. Saf. Eng. 1, 515\u2013543 (1994)","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"key":"8_CR4","unstructured":"International Electrotechnical Commission: IEC 61025 Fault Tree Analysis (FTA) (1990)"},{"key":"8_CR5","unstructured":"International Electrotechnical Commission: IEC 60300-3-9 Dependability Management \u2013 Part 3: Application guide \u2013 Section\u00a09: Risk Analysis of Technological Systems \u2013 Event Tree Analysis (ETA) (1995)"},{"key":"8_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis \u2013 The CORAS Approach","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis \u2013 The CORAS Approach. Springer, Heidelberg (2011)"},{"issue":"5","key":"8_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MC.2010.134","volume":"43","author":"MS Lund","year":"2010","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Evolution in relation to risk and trust management. Computer 43(5), 49\u201355 (2010). IEEE","journal-title":"Computer"},{"key":"8_CR8","unstructured":"Kaiser, B., Liggesmeyer, P., M\u00e4ckel, O.: A new component concept for fault trees. In: 8th Australian Workshop on Safety Critical Systems and Software (SCS\u201903), pp. 37\u201346. Australian Computer Society (2003)"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0951-8320(00)00076-4","volume":"71","author":"Y Papadoupoulos","year":"2001","unstructured":"Papadoupoulos, Y., McDermid, J., Sasse, R., Heiner, G.: Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Reliab. Eng. Syst. Saf. 71(3), 229\u2013247 (2001). Elsevier","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Viehmann, J.: Reusing risk analysis results - an extension for the CORAS risk analysis method. In: 4th International Conference on Information Privacy, Security, Risk and Trust (PASSAT\u201912), pp. 742\u2013751. IEEE (2012). doi:10.1109\/SocialCom-PASSAT.2012.91","DOI":"10.1109\/SocialCom-PASSAT.2012.91"},{"key":"8_CR11","unstructured":"Erdogan, G., Li, Y., Runde, R.K., Seehusen, F., St\u00f8len, K.: Conceptual framework for the DIAMONDS project, Oslo, May 2012"},{"key":"8_CR12","unstructured":"Erdogan, G., Seehusen, F., St\u00f8len, K., Aagedal, J.: Assessing the usefulness of testing for validating the correctness of security risk models based on an industrial case study. In: Proceedings of the International Workshop on Quantitative Aspects in Security Assurance (QASA\u201912), Pisa (2012)"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-0-85729-133-2_10","volume-title":"Advances in Systems Safety","author":"AF Benet","year":"2011","unstructured":"Benet, A.F.: A risk driven approach to testing medical device software. In: Dale, A., Anderson, T. (eds.) Advances in Systems Safety, pp. 157\u2013168. Springer, London (2011)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safety-critical embedded systems driven by fault tree analysis. In: Software Testing, Verification and Validation Workshops (ICSTW 2011), pp. 26\u201333. IEEE (2011)","DOI":"10.1109\/ICSTW.2011.90"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1002\/risk.200490005","volume":"1","author":"W Glei\u00dfner","year":"2004","unstructured":"Glei\u00dfner, W., Berger, T.: Auf nach Monte Carlo: Simulationsverfahren zur Risiko-Aggregation. RISKNEWS 1, 30\u201337 (2004). doi:10.1002\/risk.200490005. Wiley","journal-title":"RISKNEWS"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1111\/0272-4332.214136","volume":"21","author":"S Greenland","year":"2001","unstructured":"Greenland, S.: Sensitivity analysis, Monte Carlo risk analysis, and Bayesian uncertainty assessment. Risk Anal. 21, 579\u2013584 (2001). Wiley","journal-title":"Risk Anal."},{"key":"8_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-49888-6","volume-title":"Grundbegriffe der Wahrscheinlichkeitsrechnung","author":"A Kolmogorov","year":"1933","unstructured":"Kolmogorov, A.: Grundbegriffe der Wahrscheinlichkeitsrechnung. Springer, Heidelberg (1933)"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/333104.333110","volume":"6","author":"O Caprotti","year":"1999","unstructured":"Caprotti, O., Carlisle, D.: OpenMath and MathML: semantic markup for mathematics. Crossroads 6(2), 11\u201314 (1999). doi:10.1145\/333104.333110. ACM","journal-title":"Crossroads"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Viehmann, J.: The theory of creating trust with a set of mistrust-parties and its exemplary application for the s-network. In: Proceedings of Tenth Annual Conference on Privacy, Security and Trust (PST 2012), pp. 185\u2013194. IEEE (2012). doi:10.1109\/PST.2012.6297939","DOI":"10.1109\/PST.2012.6297939"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Smith, B., Williams, L.: On the effective use of security test patterns. In: Proceedings of the Sixth International Conference on Software Security and Reliability (SERE 2012), pp. 108\u2013117. IEEE (2012). doi:10.1109\/SERE.2012.23","DOI":"10.1109\/SERE.2012.23"}],"container-title":["Lecture Notes in Computer Science","Risk Assessment and Risk-Driven Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07076-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T22:46:52Z","timestamp":1703198812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07076-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319070759","9783319070766"],"references-count":20,"aliases":["10.1007\/978-3-319-14114-5_8"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07076-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}