{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:54Z","timestamp":1761401934036,"version":"3.37.3"},"reference-count":84,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11219-017-9393-3","type":"journal-article","created":{"date-parts":[[2017,11,20]],"date-time":"2017-11-20T18:11:19Z","timestamp":1511201479000},"page":"1223-1256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A tour of secure software engineering solutions for connected vehicles"],"prefix":"10.1007","volume":"26","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[]},{"given":"Antonello","family":"Calabro\u2019","sequence":"additional","affiliation":[]},{"given":"Felicita","family":"Di Giandomenico","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Lami","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4864-2219","authenticated-orcid":false,"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"key":"9393_CR1","unstructured":"Adelard LLP. (2016). ASCE Assurance & Safety Case Environment. http:\/\/www.adelard.com\/asce\/ . Online; accessed May 2016."},{"key":"9393_CR2","unstructured":"Administration, N.H.T.S., & et al. (2005). Vehicle safety communications project task 3 final report: identify intelligent vehicle safety applications enabled by dsrc. DOT HS S09 S, 59."},{"key":"9393_CR3","unstructured":"Albinet, A., Begoc, S., Boulanger, J., Casse, O., Dal, I., Dubois, H., Lakhal, F., Louar, D., Peraldi-Frati, M., Sorel, Y., et al. (2008). The memvatex methodology: from requirements to models in automotive application design. In 4th European Congress ERTS (Embedded Real Time Software), Toulouse, France."},{"issue":"3","key":"9393_CR4","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s00163-006-0023-5","volume":"17","author":"L Almefelt","year":"2006","unstructured":"Almefelt, L., Berglund, F., Nilsson, P., Malmqvist, J. (2006). Requirements management in practice: findings from an empirical study in the automotive industry. Research in Engineering Design, 17(3), 113\u2013134.","journal-title":"Research in Engineering Design"},{"key":"9393_CR5","unstructured":"ARTEMIS. (2016). JU CHESS Project. http:\/\/www.chess-project.org . Online; accessed May 2016."},{"key":"9393_CR6","unstructured":"ARTEMIS. (2016). SESAMO\u2014Security and Safety Modelling. http:\/\/sesamo-project.eu\/ . Online; accessed May 2016."},{"key":"9393_CR7","unstructured":"Automotive, S. (2010). Automotive spice, process assessment model (pam) v2.5. In The Procurement Forum. The SPICE User Group."},{"key":"9393_CR8","unstructured":"Automotive, S. (2010). Automotive spice, process reference model (prm) v4.5. In The Procurement Forum. The SPICE User Group."},{"key":"9393_CR9","unstructured":"AUTOMOTIVE SPIN. (2016). Thirteenth Automotive SPIN Italia Workshop. http:\/\/www.automotive-spin.it\/download.php . Online; accessed May 2016."},{"key":"9393_CR10","unstructured":"AUTOSAR. (2016). AUTomotive Open System ARchitecture: http:\/\/www.autosar.org\/ . Online; accessed May 2016."},{"key":"9393_CR11","doi-asserted-by":"crossref","unstructured":"Basin, D., Clavel, M., Egea, M. (2011). A decade of model-driven security. In Proceedings of the 16th ACM symposium on Access control models and technologies (pp. 1\u201310): ACM.","DOI":"10.1145\/1998441.1998443"},{"key":"9393_CR12","doi-asserted-by":"crossref","unstructured":"Becker, B., Giese, H., Neumann, S., Schenck, M., Treffer, A. (2010). Model-based extension of autosar for architectural online reconfiguration. In Proceedings of International Conference on Model Driven Engineering Languages and Systems (pp. 83\u201397): Springer.","DOI":"10.1007\/978-3-642-12261-3_9"},{"issue":"1","key":"9393_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S0167-6423(99)00015-5","volume":"36","author":"G Berry","year":"2000","unstructured":"Berry, G., Bouali, A., Fornari, X., Ledinot, E., Nassor, E., de Simone, R. (2000). Esterel: a formal method applied to avionic software development. Science of Computer Programming, 36(1), 5\u201325.","journal-title":"Science of Computer Programming"},{"key":"9393_CR14","unstructured":"Bertolino, A., Busch, M., Daoudagh, S., Lonetti, F., Marchetti, E. (2014). A toolchain for designing and testing access control policies. In Heisel, M., Joosen, W., Lopez, J., & Martinelli, F. (Eds.) Engineering Secure Future Internet Services and Systems - Current Research, Lecture Notes in Computer Science (pp. 266\u2013286): Springer."},{"issue":"4","key":"9393_CR15","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/1755951.1755907","volume":"45","author":"M Biehl","year":"2010","unstructured":"Biehl, M., DeJiu, C., T\u00f6rngren, M. (2010). Integrating safety analysis into the model-based development toolchain of automotive embedded systems. SIGPLAN Notices, 45(4), 125\u2013132.","journal-title":"SIGPLAN Notices"},{"issue":"2","key":"9393_CR16","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MVT.2009.932539","volume":"4","author":"R Brooks","year":"2009","unstructured":"Brooks, R., Sander, S., Deng, J., Taiber, J. (2009). Automobile security concerns. IEEE Vehicular Technology Magazine, 4(2), 52\u201364.","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"9393_CR17","doi-asserted-by":"crossref","unstructured":"Broy, M. (2006). Challenges in automotive software engineering. In Proceedings of the 28th international conference on Software engineering (pp. 33\u201342): ACM.","DOI":"10.1145\/1134285.1134292"},{"issue":"2","key":"9393_CR18","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/JPROC.2006.888386","volume":"95","author":"M Broy","year":"2007","unstructured":"Broy, M., Kruger, I., Pretschner, A., Salzmann, C. (2007). Engineering automotive software. Proceedings of the IEEE, 95(2), 356\u2013373.","journal-title":"Proceedings of the IEEE"},{"key":"9393_CR19","doi-asserted-by":"crossref","unstructured":"Burton, S., Likkei, J., Vembar, P., Wolf, M. (2012). Automotive functional safety= safety+ security. In Proceedings of the First International Conference on Security of Internet of Things (pp. 150\u2013159): ACM.","DOI":"10.1145\/2490428.2490449"},{"key":"9393_CR20","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium. San Francisco."},{"issue":"3","key":"9393_CR21","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/JSAC.2011.110310","volume":"29","author":"L Chen","year":"2011","unstructured":"Chen, L., Ng, S.L., Wang, G. (2011). Threshold anonymous announcement in vanets. IEEE Journal on Selected Areas in Communications, 29(3), 605\u2013615.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9393_CR22","doi-asserted-by":"crossref","unstructured":"Chou, C.M., Li, C.Y., Chien, W.M., Lan, K.c. (2009). A feasibility study on vehicle-to-infrastructure communication: Wifi vs. wimax. In Proceedings of Tenth International Conference on Mobile Data Management: Systems, Services and Middleware (pp. 397\u2013398): IEEE.","DOI":"10.1109\/MDM.2009.127"},{"key":"9393_CR23","doi-asserted-by":"crossref","unstructured":"Conrad, M. (2012). Verification and validation according to ISO 26262: A workflow to facilitate the development of high-integrity software Embedded Real Time Software and Systems.","DOI":"10.4271\/2011-01-1005"},{"key":"9393_CR24","first-page":"159","volume-title":"Model-based design using Simulink modeling, code generation, verification, and validation","author":"M Conrad","year":"2013","unstructured":"Conrad, M., & Mosterman, P.J. (2013). Model-based design using Simulink modeling, code generation, verification, and validation, (pp. 159\u2013181). New York: Wiley."},{"key":"9393_CR25","unstructured":"Cuenot, P., Frey, P., Johansson, R., L\u00f6nn, H., Papadopoulos, Y., Reiser, M.O., Sandberg, A., Servat, D., Kolagari, R.T., T\u00f6rngren, M., et al. (2010). 11 the east-adl architecture description language for automotive embedded software. In Model-based engineering of embedded real-time systems (pp. 297\u2013307): Springer."},{"key":"9393_CR26","unstructured":"Danlaw Inc. (2016). Mx-Suite. http:\/\/goo.gl\/UJcMpX . Online; accessed May 2016."},{"key":"9393_CR27","unstructured":"dSPACE. (2016). TargetLink Code Generator. https:\/\/goo.gl\/sSG0mD . Online; accessed May 2016."},{"key":"9393_CR28","unstructured":"ESTEREL. (2016). http:\/\/www.esterel-technologies.com\/products\/ . Online; accessed May 2016."},{"key":"9393_CR29","unstructured":"ETAS. (2016). http:\/\/www.etas.com\/en\/index.php . Online; accessed May 2016."},{"key":"9393_CR30","unstructured":"EVITA. (2016). E-safety vehicle intrusion protected applications. http:\/\/www.evita-project.org\/ . Online; accessed May 2016."},{"key":"9393_CR31","unstructured":"FP-7. (2016). NESSoS - Network of Excellence on Engineering Secure Future Internet Software Services and Systems. http:\/\/www.nessos-project.eu . Online; accessed May 2016."},{"key":"9393_CR32","unstructured":"FP-7. (2016). Rasen - Compositional Risk Assessment and Security Testing of Networked Systems. http:\/\/www.rasenproject.eu\/ . Online; accessed September 2016."},{"key":"9393_CR33","unstructured":"Glas, B., Gebauer, C., H\u00e4nger, J., Heyl, A., Klarmann, J., Kriso, S., Vembar, P., W\u00f6rz, P. (2014). Automotive safety and security integration challenges. In Automotive - Safety & Security."},{"key":"9393_CR34","doi-asserted-by":"crossref","unstructured":"Heisel, M., Joosen, W., Lopez, J., & Martinelli, F. (Eds.). (2014). Engineering Secure Future Internet Services and Systems - Current Research, Lecture Notes in Computer Science, Vol. 8431. Berlin: Springer.","DOI":"10.1007\/978-3-319-07452-8"},{"key":"9393_CR35","doi-asserted-by":"crossref","unstructured":"Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B. (2009). Security requirements for automotive on-board networks. In Proceedings of the 9th International Conference on Intelligent Transport System Telecommunications (ITST).","DOI":"10.1109\/ITST.2009.5399279"},{"key":"9393_CR36","doi-asserted-by":"crossref","unstructured":"Heumesser, N., & Houdek, F. (2004). Experiences in managing an automotive requirements engineering process. In Proceedings of 12th IEEE International Conference on Requirements Engineering (pp. 322\u2013327).","DOI":"10.1109\/ICRE.2004.1335690"},{"key":"9393_CR37","unstructured":"HiP-HOPS. (2016). Hierarchically Performed Hazard Origin and Propagation Studies. http:\/\/hip-hops.eu\/ . Online; accessed May 2016."},{"key":"9393_CR38","unstructured":"Holtmann, J., Meyer, J., & Meyer, M. (2011). A seamless model-based development process for automotive systems. In Proceedings of Software Engineering (Workshops) (pp. 79\u201388)."},{"key":"9393_CR39","unstructured":"IEEE. (2016). IEEE 1609 - Family of Standards for Wireless Access in Vehicular Environments (WAVE)."},{"key":"9393_CR40","unstructured":"IET. The Institution of Engineering and Technology: Automotive Cyber Security: An IET\/KTN Thought Leadership Review of risk perspective for connected vehicles. http:\/\/goo.gl\/2mhmvk . Online; accessed May 2016."},{"key":"9393_CR41","unstructured":"ikv++ Technologies. (2016). medini analyze. http:\/\/goo.gl\/kVPlp5 . Online; accessed May 2016."},{"key":"9393_CR42","unstructured":"Intecs SpA (2016). D.I.A.N.A. http:\/\/www.intecs.it\/eng\/prodotti_dettagli.asp?ID_Prodotto=30 . Online; accessed May 2016."},{"key":"9393_CR43","unstructured":"International Electrotechnical Commission. (2016). Functional Safety and IEC 61508. http:\/\/www.iec.ch\/functionalsafety\/ . Online; accessed May 2016."},{"key":"9393_CR44","unstructured":"ISO. (2016). ISO 26262 - Road Vehicles - Functional Safety. International Organization for Standardization."},{"key":"9393_CR45","unstructured":"ISO\/IEC. (2016). 27034-2:2015 - Information technology \u2013 Security techniques \u2013 Application security \u2013 Part 2: Organization normative framework. http:\/\/goo.gl\/D8EClR . Online; accessed May 2016."},{"key":"9393_CR46","unstructured":"ISO\/IEC. (2016). 9646-7:1995 - Information technology \u2013 Open Systems Interconnection \u2013 Conformance testing methodology and framework \u2013 Part 7: Implementation Conformance Statements. http:\/\/goo.gl\/9WtcAy . Online; accessed May 2016."},{"key":"9393_CR47","unstructured":"ISO\/IEC. (2016). ISO\/IEC 15408-1:2009 - Information technology \u2013 Security techniques \u2013 Evaluation criteria for IT security \u2013 Part 1: Introduction and general model. http:\/\/goo.gl\/F0A5aT . Online; accessed May 2016."},{"key":"9393_CR48","unstructured":"ITEA. (2016). DIAMONDS - Development and Industrial Application of Multi-Domain Security Testing Technologies. https:\/\/itea3.org\/project\/diamonds.htm . Online; accessed September 2016."},{"key":"9393_CR49","doi-asserted-by":"crossref","unstructured":"Izerrouken, N., Kai, O.S.Y., Pantel, M., Thirioux, X. (2010). Use of formal methods for building qualified code generator for safer automotive systems. In Proceedings of the 1st Workshop on Critical Automotive Applications: Robustness & Safety (pp. 53\u201356).","DOI":"10.1145\/1772643.1772659"},{"key":"9393_CR50","unstructured":"Kaur, M., Singh, P., et al. (2012). Performance evaluation of v2vcommunication by implementing security algorithm in vanet. In Advances in Computing and Information Technology (pp. 757\u2013763): Springer."},{"key":"9393_CR51","doi-asserted-by":"crossref","unstructured":"Kornecki, A.J., & Zalewski, J. (2010). Safety and security in industrial control. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (p. 77): ACM.","DOI":"10.1145\/1852666.1852754"},{"key":"9393_CR52","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al. (2010). Experimental security analysis of a modern automobile. In Proceedings of IEEE Symposium on Security and Privacy (pp. 447\u2013462): IEEE.","DOI":"10.1109\/SP.2010.34"},{"issue":"6","key":"9393_CR53","doi-asserted-by":"crossref","first-page":"2977","DOI":"10.1109\/TVT.2008.2010325","volume":"58","author":"G Kounga","year":"2009","unstructured":"Kounga, G., Walter, T., Lachmund, S. (2009). Proving reliability of anonymous information in vanets. IEEE Transactions on Vehicular Technology, 58(6), 2977\u20132989.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"9393_CR54","unstructured":"Leinm\u00fcller, T., Buttyan, L., Hubaux, J.P., Kargl, F., Kroh, R., Papadimitratos, P., Raya, M., Schoch, E. (2006). Sevecom-secure vehicle communication. In IST Mobile and Wireless Communication Summit, LCA-POSTER-2008-005."},{"key":"9393_CR55","unstructured":"Leinm\u00fcller, T., Schmidt, R.K., Held, A. (2010). Cooperative position verification-defending against roadside attackers 2.0. In Proceedings of 17th ITS World Congress (pp. 1\u20138)."},{"key":"9393_CR56","doi-asserted-by":"crossref","unstructured":"Lindlar, F., & Zimmermann, A. (2008). A code generation tool for embedded automotive systems based on finite state machines. In Proceedings of 6th IEEE International Conference on Industrial Informatics (pp. 1539\u20131544).","DOI":"10.1109\/INDIN.2008.4618349"},{"issue":"3","key":"9393_CR57","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/s00502-015-0301-x","volume":"132","author":"G Macher","year":"2015","unstructured":"Macher, G., Stolz, M., Armengaud, E., Kreiner, C. (2015). Filling the gap between automotive systems, safety, and software engineering. e & i Elektrotechnik und Informationstechnik, 132(3), 142\u2013148.","journal-title":"e & i Elektrotechnik und Informationstechnik"},{"issue":"3","key":"9393_CR58","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1002\/sec.760","volume":"7","author":"A Malip","year":"2014","unstructured":"Malip, A., Ng, S.L., Li, Q. (2014). A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks, 7(3), 588\u2013601.","journal-title":"Security and Communication Networks"},{"key":"9393_CR59","unstructured":"MathWorks. (2016). Embedded coder. http:\/\/it.mathworks.com\/products\/embedded-coder\/index.html . Online; accessed May 2016."},{"key":"9393_CR60","unstructured":"MathWorks. (2016). Simulink\u2014simulation and model-based design. http:\/\/it.mathworks.com\/help\/simulink\/ . Online; accessed May 2016."},{"key":"9393_CR61","volume-title":"A survey of remote automotive attack surfaces","author":"C Miller","year":"2014","unstructured":"Miller, C., & Valasek, C. (2014). A survey of remote automotive attack surfaces. USA: Black Hat."},{"key":"9393_CR62","unstructured":"Navet, N., & Simonot-Lion, F. (2013). In-vehicle communication networks-a historical perspective and review. Industrial Communication Technology Handbook, 2 edn. (Vol. 96, pp. 1204\u20131223)."},{"key":"9393_CR63","doi-asserted-by":"crossref","unstructured":"Nolte, T., Hansson, H., Bello, L.L. (2005). Automotive communications-past, current and future. In Proceedings of 10th IEEE Conference on Emerging Technologies and Factory Automation, (Vol. 1 p. 8): IEEE.","DOI":"10.1109\/ETFA.2005.1612631"},{"key":"9393_CR64","unstructured":"OMG. (2016). Systems Modeling Language. http:\/\/www.omgsysml.org\/ . Online; accessed May 2016."},{"key":"9393_CR65","unstructured":"OMG. (2016). The UML Profile for MARTE: Modeling and Analysis of Real-Time and Embedded Systems. http:\/\/www.omgmarte.org\/ . Online; accessed May 2016."},{"key":"9393_CR66","unstructured":"Open Garages. (2016). Car Hackers 2014.Owner Manual. http:\/\/goo.gl\/H1Byqn . Online; accessed May 2016."},{"issue":"11","key":"9393_CR67","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","volume":"46","author":"P Papadimitratos","year":"2008","unstructured":"Papadimitratos, P., Buttyan, L., Holczer, T.S., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.P. (2008). Secure vehicular communication systems: design and architecture. IEEE Communications Magazine, 46 (11), 100\u2013109.","journal-title":"IEEE Communications Magazine"},{"key":"9393_CR68","unstructured":"Popov, P. (2011). Preliminary interdependency analysis (PIA): method and tool support. In Troubitsyna, E. (Ed.) Software Engineering for Resilient Systems, Lecture Notes in Computer Science, (Vol. 6968 pp. 1\u20138). Berlin Heidelberg: Springer."},{"issue":"98","key":"9393_CR69","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JPROC.2010.2041835","volume":"4","author":"KV Prasad","year":"2010","unstructured":"Prasad, K.V., Broy, M., Krueger, I. (2010). Scanning advances in aerospace & automobile software technology. Proceedings of the IEEE, 4(98), 510\u2013514.","journal-title":"Proceedings of the IEEE"},{"key":"9393_CR70","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Broy, M., Kruger, I.H., Stauner, T. (2007). Software engineering for automotive systems: a roadmap. In 2007 Future of Software Engineering (pp. 55\u201371).","DOI":"10.1109\/FOSE.2007.22"},{"key":"9393_CR71","unstructured":"Razzaque, M., Salehi, A., Cheraghi, S.M. (2013). Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In Wireless Networks and Security (pp. 107\u2013132): Springer."},{"key":"9393_CR72","doi-asserted-by":"crossref","unstructured":"Robinson-Mallett, C. (2014). Coordinating security and safety engineering processes in automotive electronics development. In Proceedings of the 9th Annual Cyber and Information Security Research Conference (pp. 45\u201348).","DOI":"10.1145\/2602087.2602091"},{"key":"9393_CR73","doi-asserted-by":"crossref","unstructured":"Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W.R., Jha, S., Peyrin, T., Poschmann, A., Chakraborty, S. (2013). Security challenges in automotive hardware\/software architecture design. In Proceedings of the Conference on Design, Automation and Test in Europe (pp. 458\u2013463): EDA Consortium.","DOI":"10.7873\/DATE.2013.102"},{"key":"9393_CR74","doi-asserted-by":"crossref","unstructured":"Schroeder, J., Berger, C., Herpel, T. (2015). Challenges from integration testing using interconnected hardware-in-the-loop test rigs at an automotive oem: an industrial experience report. In Proceedings of the First International Workshop on Automotive Software Architecture (pp. 39\u201342): ACM.","DOI":"10.1145\/2752489.2752497"},{"issue":"1","key":"9393_CR75","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s00766-011-0144-x","volume":"17","author":"E Sikora","year":"2012","unstructured":"Sikora, E., Tenbergen, B., Pohl, K. (2012). Industry needs and research directions in requirements engineering for embedded systems. Requirements Engineering, 17(1), 57\u201378.","journal-title":"Requirements Engineering"},{"key":"9393_CR76","unstructured":"Sommerville, I. (2004). Software Engineering. International computer science series. ed: Addison Wesley."},{"key":"9393_CR77","doi-asserted-by":"crossref","unstructured":"Sporer, H., Macher, G., Armengaud, E., Kreiner, C. (2015). Incorporation of model-based system and software development environments. In Proceedings of 41st Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (pp. 177\u2013180).","DOI":"10.1109\/SEAA.2015.65"},{"key":"9393_CR78","doi-asserted-by":"crossref","unstructured":"Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Ka\u00e2niche, M., Laarouchi, Y. (2013). Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W) (pp. 1\u201312).","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"9393_CR79","doi-asserted-by":"crossref","unstructured":"Toeppe, S., Bostic, D., Ranville, S., Rzemien, K. (1999). Automatic code generation requirements for production automotive powertrain applications. In Proceedings of the IEEE International Symposium on Computer Aided Control System Design (pp. 200\u2013206).","DOI":"10.1109\/CACSD.1999.808648"},{"key":"9393_CR80","unstructured":"Toom, A., Izerrouken, N., Naks, T., Pantel, M., Ssi-Yan-Kai, O. (2010). Towards reliable code generation with an open tool: evolutions of the gene-auto toolset. In Proceedings of 5th International Congress and exhibition ERTS2."},{"key":"9393_CR81","unstructured":"TTCN-3. (2016). TESTING AND TEST CONTROL NOTATION VERSION 3. http:\/\/www.ttcn-3.org\/ . Online; accessed September 2016."},{"key":"9393_CR82","doi-asserted-by":"crossref","unstructured":"Voget, S. (2010). Autosar and the automotive tool chain. In Proceedings of the Conference on Design, Automation and Test in Europe (pp. 259\u2013262): European Design and Automation Association.","DOI":"10.1109\/DATE.2010.5457202"},{"key":"9393_CR83","unstructured":"Wiedersheim, B., Sall, M., Reinhard, G. (2009). Sevecomsecurity and privacy in car2car ad hoc networks. In Proceedings of 9th International Conference on Intelligent Transport Systems Telecommunications (ITST) (pp. 658\u2013661)."},{"key":"9393_CR84","unstructured":"Wolff, C., Brink, C., Httger, R., Igel, B., Kamsties, E., Krawczyk, L. (2015). Automotive software development with AMALTHEA. In Practice and Perspectives (p. 432)."}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-017-9393-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-017-9393-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-017-9393-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T06:56:49Z","timestamp":1570345009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-017-9393-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":84,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9393"],"URL":"https:\/\/doi.org\/10.1007\/s11219-017-9393-3","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"type":"print","value":"0963-9314"},{"type":"electronic","value":"1573-1367"}],"subject":[],"published":{"date-parts":[[2017,11,21]]}}}