{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T09:30:39Z","timestamp":1775813439359,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319713670","type":"print"},{"value":"9783319713687","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_5","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"50-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications"],"prefix":"10.1007","author":[{"given":"Sabarathinam","family":"Chockalingam","sequence":"first","affiliation":[]},{"given":"Dina","family":"Had\u017eiosmanovi\u0107","sequence":"additional","affiliation":[]},{"given":"Wolter","family":"Pieters","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"van Gelder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.ress.2015.02.008","volume":"139","author":"S Kriaa","year":"2015","unstructured":"Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Safety 139, 156\u2013178 (2015)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"5_CR2","unstructured":"RISI Database: Schoolboy Hacks into Polish Tram System (2016). \nhttp:\/\/www.risidata.com\/Database\/Detail\/schoolboy_hacks_into_polish_tram_system"},{"issue":"8","key":"5_CR3","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MC.2006.283","volume":"39","author":"G Stoneburner","year":"2006","unstructured":"Stoneburner, G.: Toward a unified security-safety model. Computer 39(8), 96\u201397 (2006)","journal-title":"Computer"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-24249-1_21","volume-title":"Computer Safety, Reliability, and Security","author":"G Macher","year":"2015","unstructured":"Macher, G., H\u00f6ller, A., Sporer, H., Armengaud, E., Kreiner, C.: A combined safety-hazards and security-threat analysis method for automotive systems. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 237\u2013250. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24249-1_21"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Schmittner, C., Ma, Z., Schoitsch, E., Gruber, T.: A case study of FMVEA and CHASSIS as safety and security co-analysis method for automotive cyber physical systems. In: Proceedings of the 1st ACM Workshop on Cyber Physical System Security (CPSS), pp. 69\u201380 (2015)","DOI":"10.1145\/2732198.2732204"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-12544-2_4","volume-title":"Complex Systems Design & Management Asia 2014","author":"G Sabaliauskaite","year":"2015","unstructured":"Sabaliauskaite, G., Mathur, A.P.: Aligning cyber-physical system safety and security. In: Cardin, M.A., Krob, D., Cheun, L.P., Tan, Y.H., Wood, K. (eds.) Complex Systems Design & Management Asia 2014, pp. 41\u201353. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-12544-2_4"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-319-10557-4_31","volume-title":"Computer Safety, Reliability, and Security","author":"C Schmittner","year":"2014","unstructured":"Schmittner, C., Ma, Z., Smith, P.: FMVEA for safety and security analysis of intelligent and cooperative vehicles. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 282\u2013288. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-10557-4_31"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Chen, S., Hsiung, P., Chou, I.: Unified security and safety risk assessment - a case study on nuclear power plant. In: Proceedings of the International Conference on Trusted Systems and their Applications (TSA), pp. 22\u201328 (2014)","DOI":"10.1109\/TSA.2014.13"},{"key":"5_CR9","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: Workshop on Dependable Embedded and Cyber-physical Systems (DECS), pp. 1\u20138 (2013)"},{"issue":"9","key":"5_CR10","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"IN Fovino","year":"2009","unstructured":"Fovino, I.N., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Safety 94(9), 1394\u20131402 (2009)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"5_CR11","unstructured":"European Union Agency for Network and Information Security (ENISA). The Risk Management Process (2016). \nhttps:\/\/www.enisa.europa.eu\/activities\/risk-management\/current-risk\/risk-management-inventory\/rm-process"},{"key":"5_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2015.09.009","volume":"56","author":"Y Cherdantseva","year":"2016","unstructured":"Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1\u201327 (2016)","journal-title":"Comput. Secur."},{"key":"5_CR13","unstructured":"International Electrotechnical Commission (IEC).: IEC 60812: Analysis Techniques for System Reliability - Procedures for Failure Mode and Effects Analysis (2006)"},{"issue":"3","key":"5_CR14","first-page":"194","volume":"R\u201334","author":"WS Lee","year":"1985","unstructured":"Lee, W.S., Grosh, D.L., Tillman, F.A., Lie, C.H.: Fault tree analysis, methods, and applications - a review. IEEE Trans. Reliab. R\u201334(3), 194\u2013203 (1985)","journal-title":"IEEE Trans. Reliab."},{"key":"5_CR15","unstructured":"Kaiser, B., Liggesmeyer, P., Mackel, O.: A new component concept for fault trees. In: Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software (SCS), vol. 33, pp. 37\u201346 (2003)"},{"issue":"12","key":"5_CR16","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Roy, A., Kim, D.S., Trivedi, K.S.: Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In: Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1\u201312 (2012)","DOI":"10.1109\/DSN.2012.6263940"},{"key":"5_CR18","unstructured":"National Institute of Standards and Technology (NIST): Risk Management Guide for Information Technology Systems (2002)"},{"issue":"2","key":"5_CR19","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s00766-013-0195-2","volume":"20","author":"R Scandariato","year":"2015","unstructured":"Scandariato, R., Wuyts, K., Joosen, W.: A descriptive study of Microsoft\u2019s threat modeling technique. Requirements Eng. 20(2), 163\u2013180 (2015)","journal-title":"Requirements Eng."},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11875567_2","volume-title":"Computer Safety, Reliability, and Security","author":"IN Fovino","year":"2006","unstructured":"Fovino, I.N., Masera, M.: Through the description of attacks: a multidimensional view. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 15\u201328. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11875567_2"},{"key":"5_CR21","unstructured":"International Organisation for Standardization (ISO): ISO 31000: 2009 - Risk Management - Principles and Guidelines (2009)"},{"key":"5_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-31072-0_24","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"C Raspotnig","year":"2012","unstructured":"Raspotnig, C., Karpati, P., Katta, V.: A combined process for elicitation and analysis of safety and security requirements. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) BPMDS\/EMMSAD -2012. LNBIP, vol. 113, pp. 347\u2013361. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31072-0_24"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-319-10506-2_21","volume-title":"Computer Safety, Reliability, and Security","author":"C Schmittner","year":"2014","unstructured":"Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 310\u2013325. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-10506-2_21"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-319-24249-1_24","volume-title":"Computer Safety, Reliability, and Security","author":"B Chen","year":"2015","unstructured":"Chen, B., Schmittner, C., Ma, Z., Temple, W.G., Dong, X., Jones, D.L., Sanders, W.H.: Security analysis of urban railway systems: the need for a cyber-physical perspective. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 277\u2013290. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24249-1_24"},{"key":"5_CR25","unstructured":"Information Security Forum.: Threat Horizon 2017: Dangers Accelerate (2015). \nhttps:\/\/www.securityforum.org\/uploads\/2015\/03\/Threat-Horizon_2017_Executive-Summary.pdf"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:28:54Z","timestamp":1517437734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}