{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:02:10Z","timestamp":1743130930318,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_16","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T12:22:30Z","timestamp":1511266950000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Giedre","family":"Sabaliauskaite","sequence":"first","affiliation":[]},{"given":"Sridhar","family":"Adepu","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Mathur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Adepu, S., Mathur, A.: Distributed detection of single-stage multipoint cyber attacks in a water treatment plant. In: The 11th ACM Asia Conference on Computer and Communications Security, May 2016, in Press","DOI":"10.1145\/2897845.2897855"},{"key":"16_CR2","unstructured":"Brissaud, F., Barros, A., B\u00e9renguer, C., Charpentier, D.: Reliability study of an intelligent transmitter. In: 15th ISSAT International Conference on Reliability and Quality in Design, pp. 224\u2013233. International Society of Science and Applied Technologies (2009)"},{"issue":"2","key":"16_CR3","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.ress.2010.09.010","volume":"96","author":"F Brissaud","year":"2011","unstructured":"Brissaud, F., Barros, A., B\u00e9renguer, C., Charpentier, D.: Reliability analysis for new technology-based transmitters. Reliab. Eng. Syst. Saf. 96(2), 299\u2013313 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"1","key":"16_CR4","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0029-5493(87)90304-9","volume":"104","author":"I Kim","year":"1987","unstructured":"Kim, I., Modarres, M.: Application of goal tree-success tree model as the knowledge-base of operator advisory systems. Nucl. Eng. Des. 104(1), 67\u201381 (1987)","journal-title":"Nucl. Eng. Des."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Kornecki, A.J., Subramanian, N., Zalewski, J.: Studying interrelationships of safety and security for software assurance in cyber-physical systems: approach based on Bayesian belief networks. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1393\u20131399. IEEE (2013)","DOI":"10.1109\/SysCon.2013.6549949"},{"key":"16_CR6","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.ress.2015.02.008","volume":"139","author":"S Kriaa","year":"2015","unstructured":"Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156\u2013178 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"16_CR7","unstructured":"Modarres, M., Roush, M., Hunt, R.: Application of goal trees for nuclear power plant hardware protection. In: Proceedings of the Eight International Conference on Structural Mechanics in Reactor Technology, Brussels, Belgium (1985)"},{"issue":"2","key":"16_CR8","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/S0951-8320(98)00062-3","volume":"64","author":"M Modarres","year":"1999","unstructured":"Modarres, M., Cheon, S.W.: Function-centered modeling of engineering systems using the goal tree-success tree technique and functional primitives. Reliab. Eng. Syst. Saf. 64(2), 181\u2013200 (1999)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Novak, T., Treytl, A.: Functional safety and system security in automation systems-a life cycle model. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, pp. 311\u2013318. IEEE (2008)","DOI":"10.1109\/ETFA.2008.4638412"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Modeling safety and security interdependencies with BDMP (boolean logic driven markov processes). In: 2010 IEEE International Conference on Systems Man and Cybernetics (SMC), pp. 2852\u20132861. IEEE (2010)","DOI":"10.1109\/ICSMC.2010.5641922"},{"key":"16_CR11","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.ress.2012.09.011","volume":"110","author":"L Pi\u00e8tre-Cambac\u00e9d\u00e8s","year":"2013","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110\u2013126 (2013)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"16_CR12","unstructured":"Simon, H.A.: The architecture of complexity. In: Proceedings of the American Philosophical Society, pp. 467\u2013482 (1962)"},{"key":"16_CR13","unstructured":"SWaT: Secure Water Treatment Testbed (2015). http:\/\/itrust.sutd.edu.sg\/research\/testbeds\/"},{"key":"16_CR14","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1038\/474142a","volume":"174","author":"S Weinberger","year":"2011","unstructured":"Weinberger, S.: Computer security: is this the start of cyberwarfare? Nature 174, 142\u2013145 (2011)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T19:46:30Z","timestamp":1659901590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}