{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:15:33Z","timestamp":1725704133117},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337062"},{"type":"electronic","value":"9783642337079"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33707-9_12","type":"book-chapter","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T09:34:55Z","timestamp":1351244095000},"page":"109-118","source":"Crossref","is-referenced-by-count":0,"title":["Ein Ansatz zur integrierten Sicherheitsanalyse komplexer Systeme"],"prefix":"10.1007","author":[{"given":"Michael","family":"Roth","sequence":"first","affiliation":[]},{"given":"Max","family":"Steiner","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Liggesmeyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"DIN 25424: Fehlerbaumanalyse, Methode und Bildzeichen. Deutsches Institut f\u00fcr Normung, 1981"},{"key":"12_CR2","unstructured":"B. Schneier: Attack trees. Dr. Dobb\u2019s Journal, 1999"},{"key":"12_CR3","unstructured":"K. S. Edge, G. C. Dalton, R. A. Raines, R. F. Mills: Using Attack and protection trees to analyze threats and defenses to homeland security. In: Proceedings of Military Communications Conference (MILCOM), 2006"},{"key":"12_CR4","unstructured":"Amenaza: SecurlTree, \n                  http:\/\/www.amenaza.com\/"},{"key":"12_CR5","unstructured":"H. R. Watson: Launch control safety study. Bell Labs, 1961"},{"key":"12_CR6","unstructured":"B. Kaiser, P. Liggesmeyer, O. Mackel: A new component concept for Fault Trees. In: Proceedings of the 8th Australian Workshop on safety critical systems and software, Canberra, 2003"},{"key":"12_CR7","unstructured":"I. N. Fovino, M. Masera: Through the Description of Attacks: a Multidimensional View. In: Proceedings of the 25th international conference on Computer Safety, Reliability, and Security (SafeComp06), Gdansk, 2006"},{"key":"12_CR8","unstructured":"J. Dawkins, J. Hale: A Systematic Approach to Multi-Stage Network attack Analysis. In: Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04), Charlotte, 2004"},{"key":"12_CR9","unstructured":"T. Tidwell, R. Larson, K. Fitch, J. Hale: Modeling Internet Attacks. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, New York, 2001"},{"key":"12_CR10","unstructured":"Amenaza: Understanding Risk Through Attack Tree Analysis, Homepage: \n                  http:\/\/www.amenaza.com\/downloads\/docs\/Methodology.pdf\n                  \n                , 2003"},{"key":"12_CR11","unstructured":"C. Armbrust et al.: RAVON - The Robust Autonomous Vehicle for Off-road Navigation. Using robots in hazardous environments: landmine detection, de-mining and other applications. In: Woodhead Publishing Limited, Cambridge, 2006"},{"key":"12_CR12","unstructured":"M. F\u00f6rster, R. Schwarz, M. Steiner: Integration of Modular Safety and Security Models for the Analysis of the Impact of Security on Safety, Fraunhofer IESE and University of Kaiserslautern: Kaiserslautern, Germany, 2010"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Z. Guo et al.: Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques, In Proceedings of 2010 Fifth International Conference on Software Engineering Advances (ICSEA), Nice, France, 2010","DOI":"10.1109\/ICSEA.2010.86"},{"key":"12_CR14","unstructured":"N. G. Leveson: Safeware - System Safety and Computers. In: Addison-Wesley Longman, Amsterdam, 1995"}],"container-title":["Informatik aktuell","Kommunikation unter Echtzeitbedingungen"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33707-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T13:53:13Z","timestamp":1557323593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33707-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642337062","9783642337079"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33707-9_12","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[2013]]}}}