{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:21:59Z","timestamp":1760055719321,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662715666","type":"print"},{"value":"9783662715673","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-662-71567-3_9","type":"book-chapter","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:22:17Z","timestamp":1759990937000},"page":"173-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Resilienz"],"prefix":"10.1007","author":[{"given":"Mario","family":"Trapp","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/tdsc.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A et al (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1):11\u201333. https:\/\/doi.org\/10.1109\/tdsc.2004.2","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9_CR3","first-page":"2205.13531","volume":"arXiv","author":"J Berner","year":"2022","unstructured":"Berner J et al (2022) Learning ReLU networks to high uniform accuracy is intractable. arXiv preprint arXiv:2205.13531","journal-title":"arXiv preprint"},{"key":"9_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2113-9","volume-title":"Fault-tolerant design","author":"E Dubrova","year":"2013","unstructured":"Dubrova E (2013) Fault-tolerant design, Bd 8. Springer,"},{"key":"9_CR5","first-page":"2404.15317","volume":"arXiv","author":"F Geissler","year":"2024","unstructured":"Geissler F et al (2024) Concept-guided LLM agents for human-AI safety codesign. arXiv preprint arXiv:2404.15317","journal-title":"arXiv preprint"},{"key":"9_CR6","unstructured":"Gilgen, T. (2024). Welcher Autobauer hat beim autonomen Fahren die Nase vorn. automotiveIT. https:\/\/www.automotiveit.eu\/technology\/autonomes-fahren\/welcher-autobauer-hat-beim-autonomen-fahren-die-nase-vorn-postID-306590-124.html. Zugegriffen am 17.12.2024."},{"key":"9_CR7","first-page":"167","volume-title":"International conference on knowledge-based and intelligent information and engineering systems","author":"K Heckemann","year":"2011","unstructured":"Heckemann K et al (2011) Safe automotive software. In: International conference on knowledge-based and intelligent information and engineering systems, S 167\u2013176"},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.es.04.110173.000245","volume":"4","author":"CS Holling","year":"1973","unstructured":"Holling CS (1973) Resilience and stability of ecological systems. Annual Review of Ecology and Systematics 4(1):1\u201323","journal-title":"Annual Review of Ecology and Systematics"},{"key":"9_CR9","volume-title":"Thinking, fast and slow","author":"D Kahneman","year":"2011","unstructured":"Kahneman D (2011) Thinking, fast and slow. Farrar, Straus and Giroux,"},{"key":"9_CR10","first-page":"2402.06046","volume":"arXiv","author":"P Koopman","year":"2024","unstructured":"Koopman P (2024) Anatomy of a robotaxi crash: Lessons from the cruise pedestrian dragging mishap. arXiv preprint arXiv:2402.06046","journal-title":"arXiv preprint"},{"key":"9_CR11","first-page":"34","volume-title":"27th safety-critical systems symposium","author":"P Koopman","year":"2019","unstructured":"Koopman P et al (2019) Credible autonomy safety argumentation. In: 27th safety-critical systems symposium, S 34\u201350"},{"key":"9_CR12","first-page":"G8","volume-title":"38th IEEE\/IFIP international conference on dependable systems and networks","author":"J-C Laprie","year":"2008","unstructured":"Laprie J-C (2008) From dependability to resilience. In: 38th IEEE\/IFIP international conference on dependable systems and networks, S G8\u2013G9"},{"key":"9_CR13","first-page":"302","volume-title":"International conference on computer safety, reliability, and security","author":"R Salay","year":"2022","unstructured":"Salay R, Czarnecki K (2022) A safety assurable human-inspired perception architecture. In: International conference on computer safety, reliability, and security. Springer, S 302\u2013315"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1109\/ITSC55140.2022.9922192","volume-title":"2022 IEEE 25th international conference on intelligent transportation systems (ITSC)","author":"A Salvi","year":"2022","unstructured":"Salvi A et al (2022) Safety implications of runtime adaptation to changing operating conditions. In: 2022 IEEE 25th international conference on intelligent transportation systems (ITSC), S 2444\u20132449"},{"key":"9_CR15","volume-title":"Proceedings of the ISSAT conference on reliability","author":"L Sha","year":"1994","unstructured":"Sha L et al (1994) The simplex architecture: An approach to build evolving industrial computing systems. In: Proceedings of the ISSAT conference on reliability."},{"key":"9_CR16","volume-title":"An introduction to self-adaptive systems: A contemporary software engineering perspective","author":"D Weyns","year":"2020","unstructured":"Weyns D (2020) An introduction to self-adaptive systems: A contemporary software engineering perspective. IEEE Press\/Wiley,"}],"container-title":["K\u00fcnstliche Intelligenz und Wir"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-71567-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:22:21Z","timestamp":1759990941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-71567-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"ISBN":["9783662715666","9783662715673"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-71567-3_9","relation":{},"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"19 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}