{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:12:28Z","timestamp":1775913148141,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":62,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662650035","type":"print"},{"value":"9783662650042","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-662-65004-2_7","type":"book-chapter","created":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T08:03:20Z","timestamp":1675325000000},"page":"171-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Challenges in\u00a0OT Security and\u00a0Their Impacts on\u00a0Safety-Related Cyber-Physical Production Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3814-6019","authenticated-orcid":false,"given":"Siegfried","family":"Hollerer","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Brenner","sequence":"additional","affiliation":[]},{"given":"Pushparaj Rajaram","family":"Bhosale","sequence":"additional","affiliation":[]},{"given":"Clara","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Ali Mohammad","family":"Hosseini","sequence":"additional","affiliation":[]},{"given":"Sofia","family":"Maragkou","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"Papa","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Schlund","sequence":"additional","affiliation":[]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-404X","authenticated-orcid":false,"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,3]]},"reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/JPROC.2019.2913443","volume":"107","author":"S Vitturi","year":"2019","unstructured":"S. Vitturi, C. Zunino, and T. Sauter, \u201cIndustrial communication systems and their future challenges: Next-generation Ethernet, IIoT, and 5G,\u201d Proceedings of the IEEE, vol.\u00a0107, no.\u00a06, pp.\u00a0944\u2013961, 2019.","journal-title":"Proceedings of the IEEE"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"I. Reithner, M. Papa, B. Lueger, M. Cato, S. Hollerer, and R. Seemann, \u201cDevelopment and Implementation of a Secure Production Network,\u201d Proceedings of the 31st DAAAM International Symposium, pp.\u00a0736\u2013745, 2020.","DOI":"10.2507\/31st.daaam.proceedings.102"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIE.2019.2947119","volume":"14","author":"J Jasperneite","year":"2020","unstructured":"J. Jasperneite, T. Sauter, and M.\u00a0Wollschlaeger, \u201cWhy we need automation models: Handling complexity in Industry 4.0 and the Internet of Things,\u201d IEEE Industrial Electronics Magazine, vol.\u00a014, no. 1, pp.\u00a029\u201340, 2020.","journal-title":"IEEE Industrial Electronics Magazine"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"E. J. Colbert and A. Kott, Cyber-security of SCADA and other industrial control systems. Springer, 2016, vol.\u00a066.","DOI":"10.1007\/978-3-319-32125-7"},{"key":"7_CR5","unstructured":"M. Bajer, \u201cControl systems integration using OPC standard,\u201d AGH Master Thesis, W. Grega-Supervisor, Krakow & Antwerp, 2008."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"E. Geisberger and M. Broy, Integrierte Forschungsagenda Cyber-Physical Systems: acatech STUDIE. Deutschland: acatech, 2012.","DOI":"10.1007\/978-3-642-29099-2"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"G. Martins, S. Bhatia, X. Koutsoukos, K. Stouffer, C. Tang, and R. Candell, \u201cTowards a systematic threat modeling approach for cyber-physical systems,\u201d in 2015 Resilience Week (RWS). IEEE, 2015, pp.\u00a01\u20136.","DOI":"10.1109\/RWEEK.2015.7287428"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"76","DOI":"10.2478\/aucts-2019-0015","volume":"71","author":"RE Petruse","year":"2019","unstructured":"R. E. Petruse, I. Bondrea, and I. C. Nicolae, \u201cMain requirements of a cyber physical production system demonstrator,\u201d Acta Universitatis Cibiniensis. Technical Series, vol.\u00a071, no.\u00a01, pp.\u00a076\u201380, 2019.","journal-title":"Acta Universitatis Cibiniensis. Technical Series"},{"key":"7_CR9","unstructured":"International Organization for Standardization (ISO), \u201cRobots and robotic devices - Collaborative robots,\u201d Geneva, CH, Feb. 2016."},{"key":"7_CR10","volume-title":"Introduction to Autonomous Mobile Robots","author":"R Siegwart","year":"2004","unstructured":"R. Siegwart, I. R. Nourbakhsh, and D. Scaramuzza, Introduction to Autonomous Mobile Robots, 2nd ed. Cambridge, Massachusetts: The MIT Press, 2004.","edition":"2"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"O. Khatib, \u201cMobile manipulators: Expanding the frontiers of robot applications,\u201d in Field and Service Robotics, A. Zelinsky, Ed. Springer, 1998, pp.\u00a06\u201311.","DOI":"10.1007\/978-1-4471-1273-0_2"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"B. Vogel-Heuser, T. Bauernhansl, and M. ten Hompel, Eds., Handbuch Industrie 4.0 Bd.\u00a0 2: Automatisierung, 2nd ed., ser. Springer Reference Technik. Berlin: Springer, 2017.","DOI":"10.1007\/978-3-662-53248-5"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Y. Ro, A. Brem, and P. Rauschnabel, Augmented Reality Smart Glasses: Definition, Concepts and Impact on Firm Value Creation. Gewerbestrasse 11, 6330 Cham, Switzerland: Springer International Publishing AG, 2017, ch.\u00a012, pp.\u00a0169\u2013181.","DOI":"10.1007\/978-3-319-64027-3_12"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"A. Grau, M. Indri, L. L. Bello, and T. Sauter, \u201cIndustrial robotics in factory automation: From the early stage to the Internet of Things,\u201d in IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, pp.\u00a06159\u20136164.","DOI":"10.1109\/IECON.2017.8217070"},{"key":"7_CR15","unstructured":"Statista, \u201cWie hoch sch\u00e4tzen Sie das Risiko f\u00fcr Ihr Unternehmen ein, Opfer von Cyberangriffen\/Datenklau zu werden?,\u201d 2019, accessed: 2020-10-16. [Online]. Available: https:\/\/de.statista.com\/statistik\/daten\/studie\/760006\/umfrage\/wahrgenommenes-risiko-von-cyberangriffen-unter-unternehmen-in-deutschland\/."},{"key":"7_CR16","unstructured":"C. Fife, \u201cWhat\u2019s Required To Secure The IoT?\u201d 2015, accessed: 2020-10-23. [Online]. Available: https:\/\/www.citrix.com\/blogs\/2015\/04\/09\/whats-required-to-secure-the-iot\/."},{"key":"7_CR17","unstructured":"Barrgroup-Dictionary, \u201cEmbedded System,\u201d 2020, accessed: 2020-10-14. [Online]. Available: https:\/\/barrgroup.com\/embedded-systems\/glossary-embedded_system."},{"key":"7_CR18","unstructured":"T\u00dcV Austria, Fraunhofer Austria Research GmbH, \u201cSafety & security in der Mensch-Roboter-Kollaboration,\u201d 2016. [Online]. Available: https:\/\/www.tuv.at\/fileadmin\/user_upload\/docs\/group\/innovation\/tuv-austria-white-paper-deutsch\/003_tuv_austria_white_paper_III_einfluss_it_security_sicherheit_in_der_mensch_roboter_kollaboration_fraunhofer_DE_WEB.pdf."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"M. Kumar, J. Meena, R. Singh, and M. Vardhan, \u201cData outsourcing: A threat to confidentiality, integrity, and availability,\u201d in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015, pp.\u00a01496\u20131501.","DOI":"10.1109\/ICGCIoT.2015.7380703"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"F. Accerboni and M. Sartor, \u201cISO\/IEC 27001\u2019,\u201d Quality Management: Tools, Methods, and Standards. Emerald Publishing Limited, pp.\u00a0245\u2013264, 2019.","DOI":"10.1108\/978-1-78769-801-720191015"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.arcontrol.2019.04.010","volume":"47","author":"Y Lu","year":"2019","unstructured":"Y. Lu and M. Zhu, \u201cA control-theoretic perspective on cyber-physical privacy: Where data privacy meets dynamic systems,\u201d Annual Reviews in Control, vol.\u00a047, pp.\u00a0423\u2013440, 2019.","journal-title":"Annual Reviews in Control"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"P. Van Aubel, E. Poll, and J. Rijneveld, \u201cNon-repudiation and end-to-end security for electric-vehicle charging,\u201d in 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe). IEEE, 2019, pp.\u00a01\u20135.","DOI":"10.1109\/ISGTEurope.2019.8905444"},{"key":"7_CR23","unstructured":"A. Shostack, Threat modeling: Designing for security. John Wiley & Sons, 2014."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"R. Vigo, \u201cThe cyber-physical attacker,\u201d in International Conference on Computer Safety, Reliability, and Security. Springer, 2012, pp.\u00a0347\u2013356.","DOI":"10.1007\/978-3-642-33675-1_31"},{"key":"7_CR25","unstructured":"M. T. Swarup Bhunia, Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2019."},{"issue":"2","key":"7_CR26","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"D. Dolev and A. Yao, \u201cOn the security of public key protocols,\u201d IEEE Transactions on information theory, vol.\u00a029, no.\u00a02, pp.\u00a0198\u2013208, 1983.","journal-title":"IEEE Transactions on information theory"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"M. Rocchetto and N. O. Tippenhauer, \u201cOn attacker models and profiles for cyber-physical systems,\u201d in European Symposium on Research in Computer Security. Springer, 2016, pp.\u00a0427\u2013449.","DOI":"10.1007\/978-3-319-45741-3_22"},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","volume":"40","author":"N Hoque","year":"2014","unstructured":"N. Hoque, M. H. Bhuyan, R. C. Baishya, D. K. Bhattacharyya, and J. K. Kalita, \u201cNetwork attacks: Taxonomy, tools and systems,\u201d Journal of Network and Computer Applications, vol.\u00a040, pp.\u00a0307\u2013324, 2014.","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"A. Humayed, J. Lin, F. Li, and B. Luo, \u201cCyber-physical systems security-a survey,\u201d IEEE Internet of Things Journal, vol.\u00a04, no.\u00a06, pp.\u00a01802\u20131831, 2017.","journal-title":"IEEE Internet of Things Journal"},{"key":"7_CR30","unstructured":"C. Bodungen, B. Singer, A. Shbeeb, K. Wilhoit, and S. Hilt, Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions, 1st ed. New York: McGraw-Hill Education, 2016. [Online]. Available: https:\/\/mhebooklibrary.com\/doi\/book\/10.1036\/9781259589720."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"S. J. Templeton, \u201cSecurity aspects of cyber-physical device safety in assistive environments,\u201d in Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments, ser. PETRA \u201911. New York, NY, USA: Association for Computing Machinery, 2011. [Online]. Available: https:\/\/doi.org\/10.1145\/2141622.2141685.","DOI":"10.1145\/2141622.2141685"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"A. Treytl, T. Sauter, and C. Schwaiger, \u201cSecurity measures in automation systems-a practice-oriented approach,\u201d in 2005 IEEE Conference on Emerging Technologies and Factory Automation, vol.\u00a02, 2005, pp.\u00a0847\u2013855.","DOI":"10.1109\/ETFA.2005.1612762"},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MIE.2014.2311313","volume":"8","author":"A Valenzano","year":"2014","unstructured":"A. Valenzano, \u201cIndustrial cybersecurity: Improving security through access control policy models,\u201d IEEE Industrial Electronics Magazine, vol.\u00a08, no.\u00a02, pp.\u00a06\u201317, 2014.","journal-title":"IEEE Industrial Electronics Magazine"},{"key":"7_CR34","unstructured":"K. A. Stouffer, V. Pilitteri, M. Abrams, and A. Hahn, \u201cNIST Special Publication 800-82 Revision 2. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such as Programmable Logic Controllers (PLC),\u201d Gaithersburg, MD, USA, 2015."},{"key":"7_CR35","unstructured":"\u201cIEC 62443-3-3:2013 Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels,\u201d 2013."},{"key":"7_CR36","unstructured":"D. R. Preiss, Risk analysis techniques in engineering. T\u00dcV Austria Akademie GmbH, 2020."},{"key":"7_CR37","unstructured":"International Organization for Standardization (ISO), \u201cISO\/IEC guide 73:2009 - risk management - vocabulary,\u201d 2009."},{"key":"7_CR38","unstructured":"D. W. Hubbard, The Failure of Risk Management: Why It\u2019s Broken and How to Fix It. Wiley, 2009."},{"key":"7_CR39","unstructured":"P. Gregory, CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition. McGraw-Hill, 2019."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"S.-H. Y. Xiaorong Lyu, Yulong Ding, \u201cSafety and security risk assessment in cyber-physical system,\u201d IET Cyber-Physical Systems: Theory & Applications, vol.\u00a04\u20133, pp.\u00a0221\u2013232, 2019.","DOI":"10.1049\/iet-cps.2018.5068"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"E. Ruijters and M. Stoelinga, \u201cFault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools,\u201d Computer Science Review, vol.\u00a015\u201316, pp.\u00a029\u201362, 2015. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013715000027.","DOI":"10.1016\/j.cosrev.2015.03.001"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"L. Grunske, R. Colvin, and K. Winter, \u201cProbabilistic model-checking support for FMEA,\u201d pp.\u00a0119\u2013128, 10 2007.","DOI":"10.1109\/QEST.2007.18"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"M. Rausand and S. Haugen, Hazard Identification. John Wiley & Sons, Ltd, 2020, ch.\u00a010, pp.\u00a0259\u2013337. [Online]. Available: https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/9781119377351.ch10.","DOI":"10.1002\/9781119377351.ch10"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"M. Modarres and S. W. Cheon, \u201cFunction-centered modeling of engineering systems using the goal tree-success tree technique and functional primitives,\u201d Reliability Engineering & System Safety, vol.\u00a064, no.\u00a02, pp.\u00a0181\u2013200, 1999. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832098000623.","DOI":"10.1016\/S0951-8320(98)00062-3"},{"key":"7_CR45","unstructured":"D. Lee, J. Lee, S.-W. Cheon, and J. Yoo, \u201cApplication of System-Theoretic Process Analysis to Engineered Safety Features-Component Control System,\u201d 2013."},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"I. Friedberg, K. McLaughlin, P. Smith, D. Laverty, and S. Sezer, \u201cSTPA-safesec: Safety and security analysis for cyber-physical systems,\u201d Journal of Information Security and Applications, vol.\u00a034, pp.\u00a0183\u2013196, 2017. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212616300850.","DOI":"10.1016\/j.jisa.2016.05.008"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"S. Kriaa, M. Bouissou, L. Pi\u00e8tre-Cambacedes, and Y. Halgand, \u201cA Survey of Approaches Combining Safety and Security for Industrial Control Systems,\u201d Reliability Engineering and System Safety, vol.\u00a0139, pp.\u00a0156\u2013178, 02 2015.","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"L. Chung and J. C. S. do Prado Leite, On Non-Functional Requirements in Software Engineering. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp.\u00a063\u2013379.","DOI":"10.1007\/978-3-642-02463-4_19"},{"key":"7_CR49","unstructured":"A. Kornecki, N. Subramanian, and J. Zalewski, \u201cStudying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on Bayesian belief networks,\u201d pp.\u00a01393\u20131399, 01 2013."},{"key":"7_CR50","unstructured":"International Organization for Standardization (ISO), \u201cISO 12100:2010-general principle for design-risk assessment and risk reduction.\u201d 2010."},{"key":"7_CR51","unstructured":"Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK) Austria, \u201cSicherheit f\u00fcr die digitale Transformation der Produktion,\u201d 2020, accessed: 2020-10-22. [Online]. Available: https:\/\/www.bmk.gv.at\/themen\/innovation\/publikationen\/produktion\/sigi.html."},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"J.-P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche, A. Chehab, and M. Malli, \u201cCyber-physical systems security: Limitations, issues and future trends,\u201d Microprocessors and Microsystems, vol.\u00a077, p.\u00a0103201, 2020. [Online]. Available: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0141933120303689.","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"7_CR53","unstructured":"S. F. D\u2019amato and D. W. Mallik, \u201cPlastic molding of articles including a hologram or other microstructure,\u201d Dec. 10 1991, US Patent 5,071,597."},{"key":"7_CR54","unstructured":"C. A. Cole and J. T. Weber, \u201cPackage integrity indicating closure,\u201d Apr. 2 2013, US Patent 8,408,792."},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"V. Immler, J. Obermaier, K. K. Ng, F. X. Ke, J. Lee, Y. P. Lim, W. K. Oh, K. H. Wee, and G. Sigl, \u201cSecure physical enclosures from covers with tamper-resistance,\u201d IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.\u00a02019, no.\u00a01, p.\u00a051-96, Nov. 2018. [Online]. Available: https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7334.","DOI":"10.46586\/tches.v2019.i1.51-96"},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Y. Liu, K. Huang, and Y. Makris, \u201cHardware trojan detection through golden chip-free statistical side-channel fingerprinting,\u201d in Proceedings of the 51st Annual Design Automation Conference, 2014, pp.\u00a01\u20136.","DOI":"10.1145\/2593069.2593147"},{"key":"7_CR57","doi-asserted-by":"crossref","unstructured":"M. M. T. Bhunia Swarup, The Hardware Trojan War. Springer-Verlag GmbH, 2017. [Online]. Available: https:\/\/www.springer.com\/de\/book\/9783319685106.","DOI":"10.1007\/978-3-319-68511-3"},{"key":"7_CR58","unstructured":"B. Bailey, \u201cOptimization challenges for safety and security,\u201d 2019, accessed: 2020-09-25. [Online]. Available: https:\/\/semiengineering.com\/optimization-challenges-for-safety-and-security\/."},{"issue":"12","key":"7_CR59","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/2.889093","volume":"33","author":"WA Arbaugh","year":"2000","unstructured":"W. A. Arbaugh, W. L. Fithen, and J. McHugh, \u201cWindows of vulnerability: A case study analysis,\u201d Computer, vol.\u00a033, no.\u00a012, pp.\u00a052\u201359, 2000.","journal-title":"Computer"},{"key":"7_CR60","unstructured":"A. A. C\u00e1rdenas, S. Amin, and S. Sastry, \u201cResearch challenges for the security of control systems.\u201d in HotSec, 2008."},{"key":"7_CR61","doi-asserted-by":"crossref","unstructured":"B. Brenner, E. Weippl, and A. Ekelhart, \u201cSecurity related technical debt in the cyber-physical production systems engineering process,\u201d in IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, vol.\u00a01. IEEE, 2019, pp.\u00a03012\u20133017.","DOI":"10.1109\/IECON.2019.8926646"},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"G. Sabaliauskaite and A. P. Mathur, \u201cAligning cyber-physical system safety and security,\u201d in Complex Systems Design & Management Asia. Springer, 2015, pp.\u00a041\u201353.","DOI":"10.1007\/978-3-319-12544-2_4"}],"container-title":["Digital Transformation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-65004-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T12:57:11Z","timestamp":1728824231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-65004-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783662650035","9783662650042"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-65004-2_7","relation":{},"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}