{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:43:42Z","timestamp":1725795822494},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438954"},{"type":"electronic","value":"9783662438961"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43896-1_25","type":"book-chapter","created":{"date-parts":[[2014,6,12]],"date-time":"2014-06-12T09:58:33Z","timestamp":1402567113000},"page":"277-284","source":"Crossref","is-referenced-by-count":7,"title":["Finding Threats with Hazards in the Concept Phase of Product Development"],"prefix":"10.1007","author":[{"given":"Masao","family":"Ito","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","volume-title":"Euro SPI 2013","author":"M. Ito","year":"2013","unstructured":"Ito, M.: An approach to manage the concept phase of ISO 26262. In: Euro SPI 2013. DELTA, Dundalk (2013)"},{"key":"25_CR2","unstructured":"CEI\/IEC, Hazard and operability studies (HAZOP studies) - Application guide, CEI\/IEC 61882:2001, IEC (2001)"},{"key":"25_CR3","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th International Conference on Software Engineering. IEEE Computer Society (2004)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Shi, J., et al.: A survey of cyber-physical systems. In: 2011 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE (2011)","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Kleidermacher, D., Kleidermacher, M.: Embedded systems security: practical methods for safe and secure software and systems development, 1st edn., xx, 396 p. Elsevier, Amsterdam (2012)","DOI":"10.1016\/B978-0-12-386886-2.00001-1"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-driven risk analysis: the CORAS approach. Springer (2010)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-89173-4_12","volume-title":"Critical Information Infrastructures Security","author":"G. Br\u00e6ndeland","year":"2008","unstructured":"Br\u00e6ndeland, G., Dahl, H.E.I., Engan, I., St\u00f8len, K.: Using dependent CORAS diagrams to analyse mutual dependency. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol.\u00a05141, pp. 135\u2013148. Springer, Heidelberg (2008)"},{"key":"25_CR8","unstructured":"Henniger, O., et al.: Securing vehicular on-board it systems: The evita project. In: VDI\/VW Automotive Security Conference (2009)"},{"key":"25_CR9","unstructured":"OMG, OMG Systems Modeling Language (OMG SysML) V1.1, formal\/2008-11-01, OMG (2008)"},{"key":"25_CR10","unstructured":"D\u2019Souza, D.F., Wills, A.C.: Objects, Components, and Frameworks with UML: The Catalysis Approach. Addison-Wesley Professional (1998)"},{"key":"25_CR11","unstructured":"van Lamsweerde, A.: Requirements engineering: from system goals to UML models to software specifications. John Wiley & Sons Ltd. (2009)"},{"key":"25_CR12","unstructured":"Kletz, T.A.: Hazop and hazan: identifying and assessing process industry hazards, 3rd edn., viii, p. 150. Institute of Chemical Engineers. Rugby (1992)"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"Computer Safety, Reliability and Security","author":"R. Winther","year":"2001","unstructured":"Winther, R., Johnsen, O.-A., Gran, B.A.: Security assessments of safety critical systems using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol.\u00a02187, pp. 14\u201324. Springer, Heidelberg (2001)"},{"issue":"4","key":"25_CR14","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TITS.2006.884615","volume":"7","author":"B. Arem Van","year":"2006","unstructured":"Van Arem, B., van Driel, C.J., Visser, R.: The impact of cooperative adaptive cruise control on traffic-flow characteristics. IEEE Transactions on Intelligent Transportation Systems\u00a07(4), 429\u2013436 (2006)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Leveson, N.: Engineering a safer world: Systems thinking applied to safety. MIT Press (2011)","DOI":"10.7551\/mitpress\/8179.001.0001"},{"issue":"2","key":"25_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/2556938","volume":"57","author":"W. Young","year":"2014","unstructured":"Young, W., Leveson, N.G.: An integrated approach to safety and security based on systems theory. Commun. ACM\u00a057(2), 31\u201335 (2014)","journal-title":"Commun. ACM"},{"key":"25_CR17","unstructured":"Kelling, E., et al.: Specification and evaluation of e-security relevant use cases. EVITA Deliverable D2.1, EVITA project (2009)"},{"key":"25_CR18","unstructured":"Ruddle, A., et al.: Security requirements for automotive on-board networks based on dark-side scenarios. EVITA Deliverable D2.3, EVITA project (2009)"}],"container-title":["Communications in Computer and Information Science","Systems, Software and Services Process Improvement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43896-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T22:13:47Z","timestamp":1558908827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43896-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438954","9783662438961"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43896-1_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}