{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:37:15Z","timestamp":1725889035443},"publisher-location":"Cham","reference-count":3,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_15","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"196-199","source":"Crossref","is-referenced-by-count":0,"title":["Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Faults and Attacks"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Frenkel","sequence":"first","affiliation":[]},{"given":"Victor","family":"Zakharov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"issue":"3","key":"15_CR1","first-page":"2","volume":"4","author":"S Frenkel","year":"2010","unstructured":"Frenkel, S., Pechinkin, A.: Estimation of self-healing time for digital systems under transient faults. Inf. Appl. (Informatika i ee Primeneniya) 4(3), 2\u20138 (2010)","journal-title":"Inf. Appl. (Informatika i ee Primeneniya)"},{"key":"15_CR2","unstructured":"Frenkel, S.: Some measures of self-repairing ability for fault-tolerant circuits design. In: Second Workshop MEDIAN 2013, Avignon, France, pp. 57\u201360, May 30\u201331, 2013"},{"key":"15_CR3","unstructured":"Frenkel, S., et al.: Technical report (2017). \nhttp:\/\/www.ipiran.ru\/publications\/Tech_report.pdf"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:43:46Z","timestamp":1496328226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}