{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:06:50Z","timestamp":1766048810854,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319572871"},{"type":"electronic","value":"9783319572888"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57288-8_23","type":"book-chapter","created":{"date-parts":[[2017,4,8]],"date-time":"2017-04-08T02:45:05Z","timestamp":1491619505000},"page":"310-326","source":"Crossref","is-referenced-by-count":9,"title":["From Hazard Analysis to Hazard Mitigation Planning: The Automated Driving Case"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9445-6863","authenticated-orcid":false,"given":"Mario","family":"Gleirscher","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Kugele","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,4,9]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Babin, G., Ait-Ameur, Y., Pantel, M.: Correct instantiation of a system reconfiguration pattern: a proof and refinement-based approach. In: 17th International Symposium on High Assurance Systems Engineering (HASE), pp. 31\u201338, January 2016","DOI":"10.1109\/HASE.2016.47"},{"key":"23_CR2","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Eastwood, R., Alexander, R., Kelly, T.: Safe multi-objective planning with a posteriori preferences. In: 17th International Symposium on High Assurance Systems Engineering (HASE), pp. 78\u201385, January 2016","DOI":"10.1109\/HASE.2016.22"},{"key":"23_CR4","volume-title":"Hazard Analysis Techniques for System Safety","author":"CA Ericson","year":"2015","unstructured":"Ericson, C.A.: Hazard Analysis Techniques for System Safety, 2nd edn. Wiley, Hoboken (2015)","edition":"2"},{"key":"23_CR5","unstructured":"Gleirscher, M., Kugele, S.: Reaching safe states in autonomous road vehicles. In: 35th Annual International Conference on Computer Safety, Reliability and Security (SAFECOMP). HAL, September 2016. https:\/\/hal.laas.fr\/hal-01370229 . extended abstract"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Gleirscher, M., Kugele, S.: Defining risk states in autonomous road vehicles. In: IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, January 2017","DOI":"10.1109\/HASE.2017.14"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"G\u00fcdemann, M., Ortmeier, F.: A framework for qualitative and quantitative formal model-based safety analysis. In: IEEE 12th International Symposium on High Assurance Systems Engineering (HASE), pp. 132\u2013141, November 2010","DOI":"10.1109\/HASE.2010.24"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-319-40648-0_10","volume-title":"NASA Formal Methods","author":"S Jha","year":"2016","unstructured":"Jha, S., Raman, V.: Automated synthesis of safe autonomous vehicle control under perception uncertainty. In: Rayadurgam, S., Tkachuk, O. (eds.) NFM 2016. LNCS, vol. 9690, pp. 117\u2013132. Springer, Cham (2016). doi: 10.1007\/978-3-319-40648-0_10"},{"key":"23_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8179.001.0001","volume-title":"Engineering a Safer World: Systems Thinking Applied to Safety. Engineering Systems","author":"NG Leveson","year":"2012","unstructured":"Leveson, N.G.: Engineering a Safer World: Systems Thinking Applied to Safety. Engineering Systems. MIT Press, Cambridge (2012)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Rizaldi, A., Althoff, M.: Formalising traffic rules for accountability of autonomous vehicles. In: IEEE 18th International Conference on Intelligent Transportation Systems, pp. 1658\u20131665, September 2015","DOI":"10.1109\/ITSC.2015.269"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-40648-0_14","volume-title":"NASA Formal Methods","author":"A Rizaldi","year":"2016","unstructured":"Rizaldi, A., Immler, F., Althoff, M.: A formally verified checker of the safe distance traffic rules for autonomous vehicles. In: Rayadurgam, S., Tkachuk, O. (eds.) NFM 2016. LNCS, vol. 9690, pp. 175\u2013190. Springer, Cham (2016). doi: 10.1007\/978-3-319-40648-0_14"},{"key":"23_CR12","unstructured":"SAE International: J3016: Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Technical report, January 2014"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-87698-4_24","volume-title":"Computer Safety, Reliability, and Security","author":"A Wardzi\u0144ski","year":"2008","unstructured":"Wardzi\u0144ski, A.: Safety assurance strategies for autonomous vehicles. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 277\u2013290. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-87698-4_24"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Wei, J., Snider, J.M., Kim, J., Dolan, J.M., Rajkumar, R., Litkouhi, B.: Towards a viable autonomous driving research platform. In: Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), pp. 763\u2013770, June 2013","DOI":"10.1109\/IVS.2013.6629559"}],"container-title":["Lecture Notes in Computer Science","NASA Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57288-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T16:28:50Z","timestamp":1568996930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57288-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319572871","9783319572888"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57288-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}