{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:58:15Z","timestamp":1725829095370},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242545"},{"type":"electronic","value":"9783319242552"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_28","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T13:51:13Z","timestamp":1441461073000},"page":"385-399","source":"Crossref","is-referenced-by-count":4,"title":["Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device"],"prefix":"10.1007","author":[{"given":"Peter T.","family":"Popov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"28_CR1","volume-title":"Countdown to Zero Day: Stuxnet and the Lunch of the World\u2019s First Digital Weapon","author":"K Zetter","year":"2014","unstructured":"Zetter, K.: Countdown to Zero Day: Stuxnet and the Lunch of the World\u2019s First Digital Weapon. Crown Publishers, New York (2014)"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Kriaa, S., Bouissou, M., Pietre-Cambacedes, L.: Modeling the stuxnet attack with BDMP: towards more formal risk assessments. In: 7th International Conference on Risk and Security of Internet and Systems (CRiSIS). IEEE, Ireland (2012)","DOI":"10.1109\/CRISIS.2012.6378942"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Ford, M.D., et al.: Implementing the ADVISE security modeling formalism in M\u00f6bius. In: The 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, Budapest (2013)","DOI":"10.1109\/DSN.2013.6575362"},{"issue":"1","key":"28_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TDSC.2013.24","volume":"11","author":"L Wang","year":"2014","unstructured":"Wang, L., et al.: k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans. Dependable Secure Comput. 11(1), 30\u201344 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"28_CR5","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1109\/TPWRS.2008.2002298","volume":"23","author":"C-W Ten","year":"2008","unstructured":"Ten, C.-W., Liu, C.-C., Manimaran, G.: Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans. Power Syst. 23(4), 1836\u20131846 (2008)","journal-title":"IEEE Trans. Power Syst."},{"key":"28_CR6","unstructured":"Netkachov, O., Popov, P.T., Salako, K.: Model-based evaluation of the resilience of critical infrastructures under cyber attacks. In: The 9th International Conference on Critical Information Infrastructures Security (CRITIS). Springer, Limassol (2014)"},{"key":"28_CR7","first-page":"394","volume-title":"The Black Swan: The Impact of the Highly Improbable","author":"NN Taleb","year":"2008","unstructured":"Taleb, N.N.: The Black Swan: The Impact of the Highly Improbable, p. 394. Penguin, UK (2008)"},{"key":"28_CR8","unstructured":"SESAMO: Use Case Specification (Deliverable D1.2), SESAMO Consortium, p. 105 (2013)"},{"key":"28_CR9","unstructured":"SESAMO: E-motor (2014). \n                      http:\/\/sesamo-project.eu\/content\/e-motor"},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1017\/S0021900200032058","volume":"4","author":"AW Marshall","year":"1967","unstructured":"Marshall, A.W., Olkin, I.: A generalised bivariate exponential distribution. J. Appl. Probab. 4, 291\u2013302 (1967)","journal-title":"J. Appl. Probab."},{"key":"28_CR11","unstructured":"SESAMO: Integration of Safety and Security Analysis and Assessment Techniques (Deliverable D3.3), SESAMO Consortium, p. 250 (2013)"},{"issue":"4","key":"28_CR12","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/12.2185","volume":"C-37","author":"PE Ammann","year":"1988","unstructured":"Ammann, P.E., Knight, J.C.: Data diversity: an approach to software fault tolerance. IEEE Trans. Comput. C-37(4), 418\u2013425 (1988)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"28_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/S0951-8320(97)00040-9","volume":"57","author":"A Bondavalli","year":"1997","unstructured":"Bondavalli, A., et al.: Modelling the effects of input correlation in iterative software. Reliab. Eng. Syst. Saf. 57(3), 189\u2013202 (1997)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-24270-0_1","volume-title":"Computer Safety, Reliability, and Security","author":"P Popov","year":"2011","unstructured":"Popov, P., Manno, G.: The effect of correlated failure rates on reliability of continuous time 1-out-of-2 software. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 1\u201314. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:08:09Z","timestamp":1559254089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}