{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T05:51:17Z","timestamp":1778046677447,"version":"3.51.4"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319105055","type":"print"},{"value":"9783319105062","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10506-2_22","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T02:41:50Z","timestamp":1409712110000},"page":"326-341","source":"Crossref","is-referenced-by-count":41,"title":["Safety and Security Interactions Modeling Using the BDMP Formalism: Case Study of a Pipeline"],"prefix":"10.1007","author":[{"given":"Siwar","family":"Kriaa","sequence":"first","affiliation":[]},{"given":"Marc","family":"Bouissou","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Colin","sequence":"additional","affiliation":[]},{"given":"Yoran","family":"Halgand","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Pietre-Cambacedes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Bieber, P., Blanquart, J.P., Descargues, G., Dulucq, M., Fourastier, Y., Hazane, E., Julien, M., Leonardon, L., Sarouille, G.: Security and safety assurance for aerospace embedded systems. In: Proceedings of the 6th International Conference on Embedded Real Time Software and Systems, Toulouse, France, pp. 1\u201310 (2012)"},{"issue":"2","key":"22_CR2","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0951-8320(03)00143-1","volume":"82","author":"M. Bouissou","year":"2003","unstructured":"Bouissou, M., Bon, J.-L.: A new formalism that combines advantages of fault-trees and markov models: Boolean logic driven markov processes. Reliability Engineering & System Safety\u00a082(2), 149\u2013163 (2003)","journal-title":"Reliability Engineering & System Safety"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-642-29032-9_18","volume-title":"Resilience Assessment and Evaluation of Computing Systems","author":"S. Chiaradonna","year":"2012","unstructured":"Chiaradonna, S., Di Giandomenico, F., Lollini, P.: Case study on critical infrastructures: Assessment of electric power systems. In: Wolter, K., Avritzer, A., Vieira, M., van Moorsel, A. (eds.) Resilience Assessment and Evaluation of Computing Systems, pp. 365\u2013390. Springer, Heidelberg (2012)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/3-540-48249-0_40","volume-title":"Computer Safety, Reliability and Security","author":"D.P. Eames","year":"1999","unstructured":"Eames, D.P., Moffett, J.D.: The integration of safety and security requirements. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol.\u00a01698, pp. 468\u2013480. Springer, Heidelberg (1999)"},{"key":"22_CR5","unstructured":"Hunter, B.: Integrating safety and security into the system lifecycle. In: Improving Systems and Software Engineering Conference (ISSEC), Canberr, Australia, p. 147 (August 2009)"},{"key":"22_CR6","unstructured":"Kornecki, A., Subramanian, N., Zalewski, J.: Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1393\u20131399 (2013)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Kriaa, S., Bouissou, M., Pietre-Cambacedes, L.: Modeling the stuxnet attack with BDMP: towards more formal risk assessments. In: 2012 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1\u20138 (2012)","DOI":"10.1109\/CRISIS.2012.6378942"},{"issue":"9","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"I. Nai Fovino","year":"2009","unstructured":"Nai Fovino, I., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliability Engineering & System Safety\u00a094(9), 1394\u20131402 (2009)","journal-title":"Reliability Engineering & System Safety"},{"issue":"11","key":"22_CR10","doi-asserted-by":"publisher","first-page":"3614","DOI":"10.1109\/TIE.2009.2028364","volume":"57","author":"T. Novak","year":"2010","unstructured":"Novak, T., Gerstinger, A.: Safety- and security-critical services in building automation and control systems. IEEE Transactions on Industrial Electronics\u00a057(11), 3614\u20133621 (2010)","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"22_CR11","unstructured":"Pietre-Cambacedes, L., Bouissou, M.: Beyond attack trees: Dynamic security modeling with boolean logic driven markov processes (BDMP). In: Dependable Computing Conference (EDCC), 2010 European, pp. 199\u2013208 (2010)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Pietre-Cambacedes, L., Bouissou, M.: Modeling safety and security interdependencies with BDMP (boolean logic driven markov processes). In: IEEE International Conference on Systems Man and Cybernetics (SMC), pp. 2852\u20132861 (2010)","DOI":"10.1109\/ICSMC.2010.5641922"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.ress.2012.09.011","volume":"110","author":"L. Pietre-Cambacedes","year":"2013","unstructured":"Pietre-Cambacedes, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliability Engineering & System Safety\u00a0110, 110\u2013126 (2013)","journal-title":"Reliability Engineering & System Safety"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Pietre-Cambacedes, L., Deflesselle, Y., Bouissou, M.: Security modeling with BDMP: from theory to implementation. In: 2011 Conference on Network and Information Systems Security (SAR-SSI), pp. 1\u20138 (2011)","DOI":"10.1109\/SAR-SSI.2011.5931382"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Pietre-Cambacedes, L., Bouissou, M.: Attack and defense dynamic modeling with BDMP (extended version). Tech. rep., Technical Report, Telecom ParisTech (2010)","DOI":"10.1007\/978-3-642-14706-7_7"},{"issue":"2","key":"22_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ijcip.2010.06.003","volume":"3","author":"L. Pietre-Cambacedes","year":"2010","unstructured":"Pietre-Cambacedes, L., Chaudet, C.: The SEMA referential framework: Avoiding ambiguities in the terms \u201csecurity\u201d and \u201csafety\u201d. International Journal of Critical Infrastructure Protection\u00a03(2), 55\u201366 (2010)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"22_CR17","first-page":"79","volume-title":"Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software, SCS 2003","author":"J. Smith","year":"2003","unstructured":"Smith, J., Russell, S., Looi, M.: Security as a safety issue in rail communications. In: Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software, SCS 2003, vol.\u00a033, pp. 79\u201388. Australian Computer Society, Inc., Australia (2003)"},{"key":"22_CR18","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis-finding security problems that threaten the safety of a system. In: Proceedings of Workshop DECS (ERCIM\/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Sun, M., Mohan, S., Sha, L., Gunter, C.: Addressing safety and security contradictions in cyber-physical systems. In: 1st Workshop on Future Directions in Cyber-Physical Systems Security (CPSS 2009), Newark, United States (2009)","DOI":"10.1145\/1558607.1558609"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10506-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T12:51:39Z","timestamp":1746363099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10506-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319105055","9783319105062"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10506-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}