{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:58:42Z","timestamp":1725454722303},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387883"},{"type":"electronic","value":"9783642387890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38789-0_10","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T13:40:19Z","timestamp":1367502019000},"page":"111-125","source":"Crossref","is-referenced-by-count":1,"title":["Towards Benchmarking of Functional Safety in the Automotive Industry"],"prefix":"10.1007","author":[{"given":"Mafijul Md.","family":"Islam","sequence":"first","affiliation":[]},{"given":"Behrooz","family":"Sangchoolie","sequence":"additional","affiliation":[]},{"given":"Fatemeh","family":"Ayatolahi","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Skarin","sequence":"additional","affiliation":[]},{"given":"Jonny","family":"Vinter","sequence":"additional","affiliation":[]},{"given":"Fredrik","family":"T\u00f6rner","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"K\u00e4ck","sequence":"additional","affiliation":[]},{"given":"Mattias","family":"Nyberg","sequence":"additional","affiliation":[]},{"given":"Emilia","family":"Villani","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Haraldsson","sequence":"additional","affiliation":[]},{"given":"Patrik","family":"Isaksson","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Karlsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1","volume-title":"Embedded Security in Cars","author":"K. Lemke","year":"2006","unstructured":"Lemke, K., Paar, C., Wolf, M.: Embedded Security in Cars. Springer, Berlin (2006)"},{"key":"10_CR2","unstructured":"ISO Standard, \n                    \n                      http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=43464"},{"key":"10_CR3","unstructured":"Technical Safety Concept Status Report, \n                    \n                      http:\/\/www.autosar.org\/download\/R4.0\/AUTOSAR_TR_SafetyConceptStatusReport.pdf"},{"key":"10_CR4","unstructured":"BeSafe Project, \n                    \n                      http:\/\/www.vinnova.se\/sv\/Resultat\/Projekt\/Effekta\/BeSafe\/"},{"key":"10_CR5","unstructured":"IEC 61508 Functional safety of electrical\/electronic\/programmable electronic safety-related systems, \n                    \n                      http:\/\/www.iec.ch\/zone\/fsafety"},{"key":"10_CR6","unstructured":"Kanoun, K., et al.: DBench Dependability Benchmarks. Final Project Report, Dependability Benchmarking Project (IST-2000-25425) (May 2004)"},{"issue":"12","key":"10_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"B.P. Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Communications of the ACM\u00a033(12), 32\u201344 (1990)","journal-title":"Communications of the ACM"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Koopman, P., Devale, K., Devale, J.: Interface Robustness Testing: Experience and Lessons Learned from the Ballista Project. In: Kanoun, K., Spainhower, L. (eds.) Dependability Benchmarking for Computer Systems, pp. 201\u2013226. John Wiley & Sons (2008)","DOI":"10.1002\/9780470370506.ch11"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/32.601075","volume":"23","author":"A. Mukherjee","year":"1997","unstructured":"Mukherjee, A., Siewiorek, D.P.: Measuring software dependability by robustness benchmarking. IEEE Trans. on Software Engineering\u00a023(6), 366\u2013378 (1997)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Piper, T., Winter, S., Manns, P., Suri, N.: Instrumenting AUTOSAR for dependability assessment: A guidance framework. In: Proc. of the 42nd DSN 2012 (2012)","DOI":"10.1109\/DSN.2012.6263913"},{"key":"10_CR11","unstructured":"Euro NCAP, \n                    \n                      http:\/\/www.euroncap.com\/home.aspx"},{"key":"10_CR12","unstructured":"eValue (Testing and Evaluation Methods for ICT-based Safety Systems), project ICT-2007-215607 in EU FP7, \n                    \n                      http:\/\/www.evalue-project.eu\/"},{"key":"10_CR13","unstructured":"Explanation of Error Handling on Application Level, \n                    \n                      http:\/\/www.autosar.org\/download\/R4.0\/AUTOSAR_EXP_ApplicationLevelError.pdf"},{"key":"10_CR14","unstructured":"MiBench Version 1.0, \n                    \n                      http:\/\/www.eecs.umich.edu\/mibench\/"},{"key":"10_CR15","unstructured":"Christmansson, J., Chillarege, R.: Generation of an Error Set that Emulates Software Faults \u2013 Based on Field Data. In: Proc. of the 26th Annual Int. Symposium on Fault-Tolerant Computing, FTCS 1996 (1996)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Johansson, A., Suri, N., Murphy, B.: On the Selection of Error Model(s) for OS Robustness Evaluation. In: Proc. of the 37th DSN 2007 (2007)","DOI":"10.1109\/DSN.2007.71"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Skarin, D., Barbosa, R., Karlsson, J.: GOOFI-2: A tool for experimental dependability assessment. In: Proc. of the 40th DSN 2010 (2010)","DOI":"10.1109\/DSN.2010.5544265"},{"key":"10_CR18","unstructured":"Nexus 5001TM Forum, IEEE-ISTO (1999), \n                    \n                      http:\/\/www.nexus5001.org\/"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/11408901_19","volume-title":"Dependable Computing - EDCC 2005","author":"R. Barbosa","year":"2005","unstructured":"Barbosa, R., Vinter, J., Folkesson, P., Karlsson, J.M.: Assembly-level pre-injection analysis for improving fault injection efficiency. In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol.\u00a03463, pp. 246\u2013262. Springer, Heidelberg (2005)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-15651-9_16","volume-title":"Computer Safety, Reliability, and Security","author":"R. Svenningsson","year":"2010","unstructured":"Svenningsson, R., Vinter, J., Eriksson, H., T\u00f6rngren, M.: MODIFI: A MODel-Implemented Fault Injection Tool. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 210\u2013222. Springer, Heidelberg (2010)"},{"issue":"3","key":"10_CR21","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s10703-009-0082-0","volume":"35","author":"M. Conrad","year":"2009","unstructured":"Conrad, M.: Testing-based translation validation of generated code in the context of IEC 61508. Formal Methods in System Design\u00a035(3), 389\u2013401 (2009)","journal-title":"Formal Methods in System Design"},{"key":"10_CR22","unstructured":"Conrad, M.: Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software, \n                    \n                      http:\/\/www.mathworks.com\/tagteam\/71300_1D-4.pdf"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/978-3-642-33678-2_17","volume-title":"SAFECOMP 2012","author":"D. Leo Di","year":"2012","unstructured":"Di Leo, D., Ayatolahi, F., Sangchoolie, B., Karlsson, J., Johansson, R.: On the Impact of Hardware Faults - An Investigation of the Relationship between Workload Inputs and Failure Mode Distributions. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol.\u00a07612, pp. 198\u2013209. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38789-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:24:39Z","timestamp":1557674679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38789-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387883","9783642387890"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38789-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}