{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:10:01Z","timestamp":1769739001769,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319125435","type":"print"},{"value":"9783319125442","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12544-2_4","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T15:01:55Z","timestamp":1415977315000},"page":"41-53","source":"Crossref","is-referenced-by-count":62,"title":["Aligning Cyber-Physical System Safety and Security"],"prefix":"10.1007","author":[{"given":"Giedre","family":"Sabaliauskaite","sequence":"first","affiliation":[]},{"given":"Aditya P.","family":"Mathur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: Proceedings of the 37th IEEE Annual Conference on Ind. Electronics Soc. (IECON 2011), pp. 4490\u20134494 (November 2011), doi:10.1109\/IECON.2011.6120048","DOI":"10.1109\/IECON.2011.6120048"},{"issue":"8","key":"4_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MC.2006.283","volume":"39","author":"G. Stoneburner","year":"2006","unstructured":"Stoneburner, G.: Toward a Unified Security-Safety Model. Computer\u00a039(8), 96\u201397 (2006)","journal-title":"Computer"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Roy, A., Dong, S.K., Trivedi, K.S.: Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In: Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1\u201312 (June 2012)","DOI":"10.1109\/DSN.2012.6263940"},{"issue":"9","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"I. Nai Fovino","year":"2009","unstructured":"Nai Fovino, I., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliability Engineering & System Safety\u00a094(9), 1394\u20131402 (2009)","journal-title":"Reliability Engineering & System Safety"},{"key":"4_CR5","unstructured":"ANSI\/ISA 84.00.01-2004, Application of Safety Instrumented Systems for the Process Industries. The Instrumentation, Systems, and Automation Society, Research Triangle Park, NC (2004)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Chaudet, C.: The SEMA referential framework: Avoiding ambiguities in the terms \u201csecurity\u201d and \u201csafety\u201d. International Journal of Critical Infrastructures Protection 3(2) (June 2010)","DOI":"10.1016\/j.ijcip.2010.06.003"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Reichenbach, F., Alme, K.-J., Endresen, J.: On the significance of fault tree analysis in practice. In: Proceedings of the IEEE Conference on Emerging Technologies & Factory Automation (ETFA 2009), September 22-25, pp. 1\u20137 (2009)","DOI":"10.1109\/ETFA.2009.5347210"},{"key":"4_CR8","unstructured":"ANSI\/ISA-99-00-01-2007. Security for Industrial Automation and Control Systems. Part 1: Terminology, Concepts, and Models. The Instrumentation, Systems, and Automation Society, Research Triangle Park, NC (2007)"},{"key":"4_CR9","unstructured":"Amin, S.: On Cyber Security for Networked Control Systems. PhD Thesis, University of California, Berkeley (2011)"},{"key":"4_CR10","unstructured":"ISA 99 Work Group 7 \u2013 Safety and Security (Joint with ISA84 committee), \n                  \n                    http:\/\/isa99.isa.org\/ISA99%20Wiki\/WG7.aspx\n                  \n                  \n                 (references on April 11, 2014)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Ten, C.-W., Liu, C.-C., Govindarasu, M.: Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees. In: Power Engineering Society General Meeting, pp. 1\u20138 (June 2007), doi:10.1109\/PES.2007.385876","DOI":"10.1109\/PES.2007.385876"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Kriaa, S., Bouissou, M., Pietre-Cambacedes, L.: Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments. In: Proceedings of the 7th International Conference on Risk and Security of Internet and Systems (CRiSIS 2012), pp. 1\u20138 (October 2012), doi:10.1109\/CRISIS.2012.6378942","DOI":"10.1109\/CRISIS.2012.6378942"},{"key":"4_CR13","unstructured":"Sun, M., Mohan, S., Sha, L., Gunter, C.A.: Addressing Safety and Security Contradictions in Cyber-Physical Systems. In: Proceedings of the Workshop on Future Directions in Cyber-Physical Systems (July 2009)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes). In: Proceedings of the IEEE International Conference on Systems Man and Cybernetics (SMC 2010), pp. 2852\u20132861 (October 2010)","DOI":"10.1109\/ICSMC.2010.5641922"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","volume":"100","author":"A. Banerjee","year":"2012","unstructured":"Banerjee, A., Venkatasubramanian, K.K., Mukherjee, T., Gupta, S.K.S.: Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber\u2013Physical Systems. Proceedings of the IEEE\u00a0100(1), 283\u2013299 (2012)","journal-title":"Proceedings of the IEEE"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliability Engineering & System Safety, 110\u2013126 (February 2013)","DOI":"10.1016\/j.ress.2012.09.011"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Novak, T., Treytl, A.: Functional safety and system security in automation systems - a life cycle model. In: Proceedings of the IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2008), pp. 311\u2013318 (September 2008)","DOI":"10.1109\/ETFA.2008.4638412"}],"container-title":["Complex Systems Design &amp; Management Asia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12544-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T14:16:01Z","timestamp":1559052961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12544-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319125435","9783319125442"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12544-2_4","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}