{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:25:42Z","timestamp":1742941542308,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_26","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T07:35:53Z","timestamp":1501918553000},"page":"327-338","source":"Crossref","is-referenced-by-count":0,"title":["A Novel and Unifying View of Trustworthiness in Cyberphysical Systems"],"prefix":"10.1007","author":[{"given":"Steven","family":"Drager","sequence":"first","affiliation":[]},{"given":"Janusz","family":"Zalewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.15439\/2014F490","volume":"3","author":"J Zalewski","year":"2014","unstructured":"Zalewski, J., Drager, S., McKeever, W., Kornecki, A.: Measuring security: a challenge for the generation. Ann. Comput. Sci. Inf. Syst. 3, 131\u2013140 (2014)","journal-title":"Ann. Comput. Sci. Inf. Syst."},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Kornecki, A., Zalewski, J.: Aviation software: safety and security. In: Webster, J. (ed.) Wiley Encyclopedia of Electrical and Electronics Engineering. Wiley (2015)","DOI":"10.1002\/047134608X.W8241"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Boland, T., Cleraux, C., Fong, E.: Toward a preliminary framework for assisting the trustworthiness of software, report NIST I.A. 7755, National Institute of Standards and Technology, Gaithersburg, November 2010","DOI":"10.6028\/NIST.IR.7755"},{"key":"26_CR4","unstructured":"PAS 754:2014 Software Trustworthiness \u2013 Governance and Management \u2013 Specification. British Standards Institution, June 2014"},{"issue":"5","key":"26_CR5","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MS.2011.93","volume":"28","author":"V Bianco","year":"2011","unstructured":"Bianco, V., et al.: A survey on open source software trustworthiness. IEEE Softw. 28(5), 67\u201375 (2011)","journal-title":"IEEE Softw."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Ross, R., McEvilley, M., Oren, J.C.: Systems security engineering: considerations for multidisciplinary approach in the engineering of trustworthy secure systems, NIST S.P. 800-160 \u2013 Second Public Draft, National Institute of Standards and Technology, Gaithersburg, May 2016","DOI":"10.6028\/NIST.SP.800-160"},{"issue":"5","key":"26_CR7","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough sets. Int. J. Comput. Inform. Sci. 11(5), 341\u2013356 (1982)","journal-title":"Int. J. Comput. Inform. Sci."},{"key":"26_CR8","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Mateo (1988)"},{"key":"26_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85066-3","volume-title":"An Introduction to Bayesian Networks","author":"FV Jensen","year":"1996","unstructured":"Jensen, F.V.: An Introduction to Bayesian Networks. Springer, Heidelberg (1996). doi: 10.1007\/978-3-540-85066-3"},{"key":"26_CR10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.2517-6161.1968.tb00722.x","volume":"30","author":"AP Dempster","year":"1968","unstructured":"Dempster, A.P.: A generalization of Bayesian inference. J. R. Stat. Soc. Ser. B 30, 205\u2013247 (1968)","journal-title":"J. R. Stat. Soc. Ser. B"},{"key":"26_CR11","first-page":"656","volume-title":"The Oxford Handbook of Nonlinear Filtering","author":"A Doucet","year":"2011","unstructured":"Doucet, A., Johansen, A.M.: A tutorial on particle filtering and smoothing: fifteen years later. In: Crisan, D., Rozovsky, B. (eds.) The Oxford Handbook of Nonlinear Filtering, pp. 656\u2013704. Oxford University Press, Oxford (2011)"},{"issue":"1","key":"26_CR12","first-page":"16","volume":"12","author":"AJ Kornecki","year":"2013","unstructured":"Kornecki, A.J., Wierzchon, S.T., Zalewski, J.: Reasoning under uncertainty with Bayesian belief networks enhanced with rough sets. Int. J. Comput. 12(1), 16\u201331 (2013)","journal-title":"Int. J. Comput."},{"issue":"3\u20134","key":"26_CR13","first-page":"173","volume":"2","author":"UK Rakowsky","year":"2007","unstructured":"Rakowsky, U.K.: Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling. Reliab. Theor. Appl. 2(3\u20134), 173\u2013185 (2007)","journal-title":"Reliab. Theor. Appl."},{"key":"26_CR14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/S0096-3003(01)00298-3","volume":"134","author":"MF Al-Saleh","year":"2003","unstructured":"Al-Saleh, M.F., Masoud, F.A.: A note on the posterior expected loss as a measure of accuracy in Bayesian methods. Appl. Math. Comput. 134, 507\u2013514 (2003)","journal-title":"Appl. Math. Comput."},{"key":"26_CR15","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1016\/j.ijar.2011.06.003","volume":"52","author":"T Reineking","year":"2011","unstructured":"Reineking, T.: Particle filtering in the Dempster-Shafer theory. Int. J. Approx. Reason. 52, 1124\u20131135 (2011)","journal-title":"Int. J. Approx. Reason."}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:45:16Z","timestamp":1719362716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}