{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:36:33Z","timestamp":1768563393133,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319242484","type":"print"},{"value":"9783319242491","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24249-1_21","type":"book-chapter","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T07:43:15Z","timestamp":1441611795000},"page":"237-250","source":"Crossref","is-referenced-by-count":28,"title":["A Combined Safety-Hazards and Security-Threat Analysis Method for Automotive Systems"],"prefix":"10.1007","author":[{"given":"Georg","family":"Macher","sequence":"first","affiliation":[]},{"given":"Andrea","family":"H\u00f6ller","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Sporer","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Armengaud","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kreiner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-40894-6_2","volume-title":"Software Engineering for Resilient Systems","author":"R Bloomfield","year":"2013","unstructured":"Bloomfield, R., Netkachova, K., Stroud, R.: Security-informed safety: if it\u2019s not secure, it\u2019s not safe. In: Gorbenko, A., Romanovsky, A., Kharchenko, V. (eds.) SERENE 2013. LNCS, vol. 8166, pp. 17\u201332. Springer, Heidelberg (2013)"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MC.2009.118","volume":"42","author":"C Ebert","year":"2009","unstructured":"Ebert, C., Jones, C.: Embedded software: facts, figures, and future. IEEE Comput. Soc. 42(4), 42\u201352 (2009). ISSN: 0018-9162","journal-title":"IEEE Comput. Soc."},{"key":"21_CR3","unstructured":"Gashi, I., Povyakalo, A., Strigini, L., Matschnig, M., Hinterstoisser, T., Fischer, B.: Diversity for safety and security in embedded systems. In: International Conference on Dependable Systems and Networks, vol. 26, 06 2014"},{"key":"21_CR4","unstructured":"ISO - International Organization for Standardization. ISO 26262 Road vehicles Functional Safety Part 1\u201310 (2011)"},{"key":"21_CR5","series-title":"ISO - International Organization for Standardization.ISO\/IEC 15408","volume-title":"Encyclopedia of Cryptography and Security","year":"2011","unstructured":"van Tilborg, H.C.A., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. ISO\/IEC 15408, 2nd edn. Springer, Heidelberg (2011)","edition":"2"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: IEEE Conference on Technologies for Homeland Security (HST), pp. 585\u2013590, November 2012","DOI":"10.1109\/THS.2012.6459914"},{"key":"21_CR7","unstructured":"Kath, O., Schreiner, R., Favaro, J.: Safety, security, and software reuse: a model-based approach. In: Fourth International Workshop in Software Reuse and Safety Proceedings, September 2009"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA: a security-aware hazard and risk analysis method. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 621\u2013624, March 2015","DOI":"10.7873\/DATE.2015.0622"},{"key":"21_CR9","unstructured":"Microsoft Corporation. The stride threat model (2005)"},{"key":"21_CR10","unstructured":"Paulitsch, M., Reiger, R., Strigini, L., Bloomfield, R.: Evidence-based security in aerospace. In: ISSRE Workshops 2012, 21\u201322 (2012)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Raspotnig, C., Katta, V., Karpati, P., Opdahl, A.L.: Enhancing CHASSIS: a method for combining safety and security. In: 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, 2\u20136 September 2013, pp. 766\u2013773 (2013)","DOI":"10.1109\/ARES.2013.102"},{"key":"21_CR12","unstructured":"Roth, M., Liggesmeyer, P.: Modeling and analysis of safety-critical cyber physical systems using state\/event fault trees. In: SAFECOMP 2013 - Workshop DECS (ERCIM\/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)"},{"key":"21_CR13","unstructured":"SAE International. Guidelines and Mehtods for Conductiong the Safety Assessment Process on Civil Airborne Systems and Equipment (1996)"},{"key":"21_CR14","unstructured":"SAE International. Guidelines for Development of Civil Aircraft and Systems (2010)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Schmidt, K., Troeger, P., Kroll, H., Buenger, T.: Adapted development process for security in networked automotive systems. In: SAE 2014 World Congress and Exhibition Proceedings, (SAE 2014-01-0334), pp. 516\u2013526 (2014)","DOI":"10.4271\/2014-01-0334"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/978-3-319-10506-2_21","volume-title":"Computer Safety, Reliability, and Security","author":"C Schmittner","year":"2014","unstructured":"Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 310\u2013325. Springer, Heidelberg (2014)"},{"key":"21_CR17","unstructured":"Scuro, G.: Automotive industry: Innovation driven by electronics (2012). \n                      http:\/\/embedded-computing.com\/articles\/automotive-industry-innovation-driven-electronics\/"},{"key":"21_CR18","first-page":"351","volume":"1","author":"CP Simion","year":"2013","unstructured":"Simion, C.P., Bucovtchi, O.M.C., Popescu, C.A.: Critical infrastructures protection through threat analysis framework. Ann. Oradea Univ. 1, 351\u2013354 (2013)","journal-title":"Ann. Oradea Univ."},{"key":"21_CR19","unstructured":"Special Committee 205 of RTCA. DO-178C Software Considerations in Airborne Systems and Equipment Certification (2011)"},{"key":"21_CR20","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: SAFECOMP 2013 - Workshop DECS (ERCIM\/EWICS Workshop on Dependable Embedded and Cyber-Physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)"},{"key":"21_CR21","unstructured":"The Common Criteria Recognition Agreement Members. Common Criteria for Information Technology Security Evaluation (2014). \n                      http:\/\/www.commoncriteriaportal.org\/"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Ward, D., Ibara, I., Ruddle, A.: Threat analysis and risk assessment in automotive cyber security. In: SAE 2013 World Congress and Exhibition Proceedings, pp. 507\u2013513 (2013)","DOI":"10.4271\/2013-01-1415"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24249-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:01:15Z","timestamp":1559239275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24249-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242484","9783319242491"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24249-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}