{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:52:29Z","timestamp":1725454349050},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336744"},{"type":"electronic","value":"9783642336751"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_47","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:33:04Z","timestamp":1347280384000},"page":"498-507","source":"Crossref","is-referenced-by-count":0,"title":["Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation"],"prefix":"10.1007","author":[{"given":"Sven","family":"Kuhlmann","sequence":"first","affiliation":[]},{"given":"Jana","family":"Fruth","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Hoppe","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Schramm, M.: Organic Computing - \u201cMr. Self-X \u201d- Wie Computer autonom werden. Bayern 2 (November 2010)"},{"key":"47_CR2","unstructured":"AnyLogic, \n                    \n                      http:\/\/www.xjtek.com\/\n                    \n                    \n                   (last access: September 23, 2011)"},{"key":"47_CR3","volume-title":"Bussysteme in der Fahrzeugtechnik: Protokolle und Standards","author":"W. Zimmermann","year":"2006","unstructured":"Zimmermann, W., Schmidgall, R.: Bussysteme in der Fahrzeugtechnik: Protokolle und Standards, 2nd edn. Vieweg, Wiesbaden (2006)","edition":"2"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"Bauer, H.: Kraftfahrtechnisches Taschenbuch. Vieweg (2003)","DOI":"10.1007\/978-3-663-10554-1"},{"key":"47_CR5","unstructured":"Bauer, H., Dietsche, K.H., Zabler, E., Crepin, J.: Sensoren im Kraftfahrzeug, Bosch. Gelbe Reihe (2007)"},{"key":"47_CR6","volume-title":"Automotive - Safety & Security 2010 Sicherheit und Zuverl\u00e4ssigkeit f\u00fcr automobile Informationstechnik","author":"T. Hoppe","year":"2010","unstructured":"Hoppe, T., Dittmann, J., M\u00fcter, M.: Decision Model for Automotive intrusion detection systems. In: Automotive - Safety & Security 2010 Sicherheit und Zuverl\u00e4ssigkeit f\u00fcr automobile Informationstechnik, Stuttgart, Juni 22-23. Shaker Verlag, Aachen (2010)"},{"key":"47_CR7","unstructured":"Dittmann, J., Hoppe, T., Kiltz, S., Tuchscheerer, S.: Elektronische Manipulation von Fahrzeug- und Infrastruktursystemen: Gef\u00e4hrdungspotentiale f\u00fcr die Stra\u00dfenverkehrssicherheit, Paperback, 92 pages. Wirtschaftsverlag N. W. Verlag f\u00fcr neue Wissenschaft (2011) ISBN 978-3869181158"},{"key":"47_CR8","unstructured":"Da: Zulieferer werden f\u00fcr die Automobilindustrie immer wichtiger (July 6, 2001), \n                    \n                      http:\/\/www.welt.de\/print-welt\/article461473\/\n                    \n                    \n                   (last access: July 15, 2012)"},{"key":"47_CR9","unstructured":"Kiltz, S., Hildebrand, M., Dittmann, J.: Forensische Datenarten und -analysen in automotiven Systemen. In: Horster, P. (ed.) D-A-CH Security 2009, Bochum, Deutschland, May 19-20, pp. 141\u2013152 (2009) ISBN 978-3-00-027488-6"},{"key":"47_CR10","unstructured":"Hoppe, T., Holthusen, S., Tuchscheerer, S., Kiltz, S., Dittmann, J.: Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenhaltung. In: Sicherheit 2010 - Sicherheit, Schutz und Zuverl\u00e4ssigkeit, 5, October 5-7, pp. S.153\u2013S.164. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V (GI), Berlin (2010)"},{"key":"#cr-split#-47_CR11.1","unstructured":"Tuchscheerer, S., Hoppe, T., Dittmann, J., Pukall, M., Adamczyk, H.: Herausforderungen an die Absicherung von IT Systemen in der Entwicklung, Betrieb und Wartung von Fahrzeugen. In: Forschung und Innovation - Magdeburg: Univ., insges. 9 S., 2011 Kongress: Magdeburger Maschinenbau-Tage"},{"key":"#cr-split#-47_CR11.2","unstructured":"10 (Magdeburg), Buchbeitrag, September 27-29 (2011) ISBN 978-3-940961-60-0"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:18:37Z","timestamp":1620116317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}