{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:18Z","timestamp":1776782838569,"version":"3.51.2"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319662657","type":"print"},{"value":"9783319662664","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66266-4_20","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T02:33:31Z","timestamp":1502850811000},"page":"305-319","source":"Crossref","is-referenced-by-count":22,"title":["A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6045-1565","authenticated-orcid":false,"given":"J\u00fcrgen","family":"D\u00fcrrwang","sequence":"first","affiliation":[]},{"given":"Kristian","family":"Beckers","sequence":"additional","affiliation":[]},{"given":"Reiner","family":"Kriesten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.3390\/info7030036","volume":"7","author":"K Beckers","year":"2016","unstructured":"Beckers, K., D\u00fcrrwang, J., Holling, D.: Standard compliant hazard and threat analysis for the automotive domain. Information 7(3), 36 (2016). http:\/\/www.mdpi.com\/2078-2489\/7\/3\/36","journal-title":"Information"},{"key":"20_CR2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.ress.2016.09.004","volume":"158","author":"K Beckers","year":"2016","unstructured":"Beckers, K., Holling, D., C\u00f4t\u00e9, I., Hatebur, D.: A structured hazard analysis and risk assessment method for automotive systems-a descriptive study. Reliab. Eng. Syst. Safety 158, 185\u2013195 (2016)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"20_CR3","unstructured":"Charette, R.N.: This car runs on code (2009). http:\/\/spectrum.ieee.org\/transportation\/systems\/this-car-runs-on-code . Accessed 12 Feb 2016"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-15651-9_24","volume-title":"Computer Safety, Reliability, and Security","author":"D Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 317\u2013331. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15651-9_24"},{"key":"20_CR5","unstructured":"IEC: Hazard and Operability Studies (HAZOP studies). ISO\/IEC 62882, International Electrotechnical Commission (IEC) (2005)"},{"key":"20_CR6","unstructured":"ISO: ISO 26262 - Road Vehicles - Functional Safety (2011)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Wei, J., Matsubara, Y., Takada, H.: HAZOP-based security analysis for embedded systems: case study of open. In: 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. SSS-1\u2013SSS-8 (2016)","DOI":"10.1109\/ECAI.2015.7301196"},{"key":"20_CR8","unstructured":"J\u00fcrgen, D.: Evaluation security guideword experiment. http:\/\/www.home.hs-karlsruhe.de\/~duju0001\/Evaluation_SGM\/ . Accessed 13 Mar 2017"},{"key":"20_CR9","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces (2014)"},{"key":"20_CR10","unstructured":"Rheinberg, F., Vollmeyer, R., Engeser, S.: Die Erfassung des Flow-Rrlebens (2003)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Ring, M., D\u00fcrrwang, J., Sommer, F., Kriesten, R.: Survey on vehicular attacks\u00a0- building a vulnerability database. In: 2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 208\u2013212 (2015)","DOI":"10.1109\/ICVES.2015.7396919"},{"key":"20_CR12","unstructured":"SAE: Cybersecurity guidebook for cyber-physical vehicle systems (2016). http:\/\/standards.sae.org\/wip\/j3061\/ . Accessed 12 Apr 2016"},{"issue":"2","key":"20_CR13","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s00766-013-0195-2","volume":"20","author":"R Scandariato","year":"2015","unstructured":"Scandariato, R., Wuyts, K., Joosen, W.: A descriptive study of Microsoft\u2019s threat modeling technique. Requirements Eng. 20(2), 163\u2013180 (2015)","journal-title":"Requirements Eng."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Schmittner, C., Ma, Z., Schoitsch, E., Gruber, T.: A case study of FMVEA and CHASSIS as safety and security co-analysis method for automotive cyber-physical systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 69\u201380 (2015)","DOI":"10.1145\/2732198.2732204"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"Computer Safety, Reliability and Security","author":"R Winther","year":"2001","unstructured":"Winther, R., Johnsen, O.-A., Gran, B.A.: Security assessments of safety critical systems using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol. 2187, pp. 14\u201324. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45416-0_2"},{"key":"20_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering. Springer Science & Business Media, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66266-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:57:53Z","timestamp":1750805873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66266-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662657","9783319662664"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66266-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}