{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:08Z","timestamp":1767340088819},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201267"},{"type":"electronic","value":"9783540398783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39878-3_23","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T22:39:03Z","timestamp":1277332743000},"page":"289-302","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing Software Safety by Fault Trees: Experiences from an Application to Flight Critical SW"],"prefix":"10.1007","author":[{"given":"Wolfgang","family":"Weber","sequence":"first","affiliation":[]},{"given":"Heidemarie","family":"Tondok","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Bachmayer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"U. S. Nuclear Regulatory Commission: Fault Tree Handbook, NUREG-0492, Washington, D.C (1981)"},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TSE.1983.235116","volume":"9","author":"N. Leveson","year":"1983","unstructured":"Leveson, N., Harvey, P.: Analyzing Software Safety. IEEE Transaction on Software Engineering\u00a09(5), 569\u2013579 (1983)","journal-title":"IEEE Transaction on Software Engineering"},{"issue":"4","key":"23_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/52.300036","volume":"8","author":"N. Leveson","year":"1991","unstructured":"Leveson, N., Cha, S., Shimeall, T.: Safety Verification of Ada Programs Using Software Fault Trees. IEEE Software\u00a08(4), 48\u201359 (1991)","journal-title":"IEEE Software"},{"key":"23_CR4","volume-title":"Safeware: System Safety and Computers","author":"N. Leveson","year":"1995","unstructured":"Leveson, N.: Safeware: System Safety and Computers. Addison-Wesley, Reading (1995)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., Lutz, R.: A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. In: Proceedings of the Symposium on Requirements Engineering for Information Security, Indianapolis, IN, USA (2001), http:\/\/www.palisadesys.com\/~ghelmer\/background.html","DOI":"10.1007\/s007660200016"},{"key":"23_CR6","unstructured":"Bowman, W.C., Archinoff, G.H., Raina, V.M., Tremaine, D.R., Leveson, N.G.: An application of fault tree analysis to safety critical software at Ontario Hydro. In: Conference on Probabilistic Safety Assessment and Management (PSAM), Beverly Hills (April 1991)"},{"key":"23_CR7","unstructured":"D\u2019Ambrogio, A., Iazeolla, G., Mirandola, R.: A Method for the Prediction of Software Reliability. In: Proc. of the 6-th IASTED Software Engineering and Applications Conference (SEA 2002), Cambridge, MA, USA (2002), http:\/\/sel.info.uniroma2.it\/publications.htm"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Pai, G., Bechta Dugan, J.: Automatic Synthesis of Dynamic Fault Trees from UML System Models. In: International Symposium on Software Reliability Engineering (ISSRE 2002), Annapolis, ML, USA (2002), www.ee.virginia.edu\/~gjp5j\/professional\/research\/research.htm","DOI":"10.1109\/ISSRE.2002.1173261"},{"key":"23_CR9","unstructured":"Papadopoulos, Y., Maruhn, M.: Model-Based Automated Synthesis of Fault Trees from Matlab-Simulink Models. In: The International Conference on Dependable Systems and Networks (DSN 2001), Goteborg, Sweden (2001), http:\/\/www2.dcs.hull.ac.uk\/people\/cssyp\/"},{"key":"23_CR10","unstructured":"Mason, R.W.: Fault Isolator Tool for Software Fault Tree Analysis, Storming Media, Washington (1995), http:\/\/www.stormingmedia.us\/cgi-bin\/99\/9934\/A993492-54-33t.php"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39878-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T02:01:24Z","timestamp":1635559284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39878-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201267","9783540398783"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39878-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}