{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T23:59:39Z","timestamp":1774051179969,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319242545","type":"print"},{"value":"9783319242552","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_10","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T13:51:13Z","timestamp":1441461073000},"page":"121-134","source":"Crossref","is-referenced-by-count":8,"title":["Integrated Safety Analysis Using Systems-Theoretic Process Analysis and Software Model Checking"],"prefix":"10.1007","author":[{"given":"Asim","family":"Abdulkhaleq","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"10_CR1","series-title":"Engineering Systems","volume-title":"Engineering a Safer World: Systems Thinking Applied to Safety","author":"NG Leveson","year":"2011","unstructured":"Leveson, N.G.: Engineering a Safer World: Systems Thinking Applied to Safety. Engineering Systems. MIT Press, Cambridge (2011)"},{"key":"10_CR2","unstructured":"NASA-GB- 8719.13: NASA Software Safety Guidebook (2004)"},{"key":"10_CR3","unstructured":"ISO26262: Road vehicles - Functional safety. International Standard (2011)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, 31 October 1977\u20132 November 1977, pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"10_CR5","unstructured":"Abdulkhaleq, A., Wagner. S.: Experiences with applying STPA to software-intensive systems in the automotive domain. In: STAMP Conference. MIT (2013)"},{"key":"10_CR6","unstructured":"Abdulkhaleq, A., Wagner, S.: XSTAMPP: an eXtensible STAMP platform as tool support for safety engineering. In: STAMP Conference. MIT (2015)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/11537328_3","volume-title":"Model Checking Software","author":"GJ Holzmann","year":"2005","unstructured":"Holzmann, G.J., Ruys, T.C.: Effective bug hunting with spin and modex. In: Godefroid, P. (ed.) SPIN 2005. LNCS, vol. 3639, p. 24. Springer, Heidelberg (2005)"},{"issue":"5","key":"10_CR8","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"GJ Holzmann","year":"1997","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Trans. Softw. Eng. 23(5), 279\u2013295 (1997)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR9","volume-title":"Principles of Model Checking (Representation and Mind Series)","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking (Representation and Mind Series). The MIT Press, Cambridge (2008)"},{"issue":"3","key":"10_CR10","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s10009-009-0106-5","volume":"11","author":"B Schlich","year":"2009","unstructured":"Schlich, B., Kowalewski, S.: Model checking C source code for embedded systems. Int. J. Softw. Tools Technol. Transf. 11(3), 187\u2013202 (2009)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-85114-1_22","volume-title":"Model Checking Software","author":"A Zaks","year":"2008","unstructured":"Zaks, A., Joshi, R.: Verifying multi-threaded C programs with SPIN. In: Havelund, K., Majumdar, R. (eds.) SPIN 2008. LNCS, vol. 5156, pp. 325\u2013342. Springer, Heidelberg (2008)"},{"key":"10_CR12","volume-title":"Extending and Automating a Systems-Theoretic Hazard Analysis for Requirements Generation and Analysis","author":"J Thomas","year":"2013","unstructured":"Thomas, J.: Extending and Automating a Systems-Theoretic Hazard Analysis for Requirements Generation and Analysis. Massachusetts Institute of Technology, Cambridge (2013)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Wagner, S., Sch\u00e4tz, B., Puchner, S., Kock, P.: A case study on safety cases in the automotive domain: modules, patterns, and models. In: Proceedings of IEEE 21st International Symposium on Software Reliability Engineering, pp. 269\u2013278 (2010)","DOI":"10.1109\/ISSRE.2010.31"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/978-3-319-10557-4_44","volume-title":"Computer Safety, Reliability, and Security","author":"A Abdulkhaleq","year":"2014","unstructured":"Abdulkhaleq, A., Wagner, S.: A software safety verification method based on system-theoretic process analysis. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 401\u2013412. Springer, Heidelberg (2014)"},{"key":"10_CR15","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ress.2014.10.025","volume":"135","author":"S Sharvia","year":"2015","unstructured":"Sharvia, S., Papadopoulos, Y.: Integrating model checking with HiP-HOPS in model-based safety analysis. Reliab. Eng. Syst. Saf. 135, 64\u201380 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"4","key":"10_CR16","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/s100090050046","volume":"2","author":"A Cimatti","year":"2000","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: NUSMV: a new symbolic model checker. Int. J. Softw. Tools Technol. Transfer 2(4), 410\u2013425 (2000)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"10_CR17","unstructured":"SAE: Society of Automotive Engineering, Adaptive Cruise Control Operating Characteristics and User Interface, SAE J2399 (2003)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T06:33:59Z","timestamp":1567146839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}