{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:08:09Z","timestamp":1766268489950,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s13198-021-01305-6","type":"journal-article","created":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T10:02:41Z","timestamp":1630749761000},"page":"1334-1347","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Cyber physical systems-reliability modelling: critical perspective and its impact"],"prefix":"10.1007","volume":"12","author":[{"given":"Ashish","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Monika","family":"Saini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5140-1731","authenticated-orcid":false,"given":"Dinesh Kumar","family":"Saini","sequence":"additional","affiliation":[]},{"given":"Nikhilesh","family":"Badiwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,4]]},"reference":[{"issue":"3","key":"1305_CR1","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-019-01380-5","volume":"11","author":"P Asghari","year":"2020","unstructured":"Asghari P, Soleimani E, Nazerfard E (2020) Online human activity recognition employing hierarchical hidden Markov models. J Ambient Intell Humaniz Comput 11(3):1141\u20131152","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"7","key":"1305_CR2","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1007\/s12652-019-01327-w","volume":"11","author":"H Amirat","year":"2020","unstructured":"Amirat H, Lagraa N, Fournier-Viger P, Ouinten Y (2020) Nextroute: a lossless model for accurate mobility prediction. J Ambient Intell Humaniz Comput 11(7):2661\u20132681","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1305_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.compind.2018.04.017","volume":"100","author":"R Alguliyev","year":"2018","unstructured":"Alguliyev R, Imamverdiyev Y, Sukhostat L (2018) Cyber-physical systems and their security issues. Comput Ind 100:212\u2013223","journal-title":"Comput Ind"},{"issue":"1","key":"1305_CR4","first-page":"161","volume":"12","author":"R Baheti","year":"2011","unstructured":"Baheti R, Gill H (2011) Cyber-physical systems. Impact Control Technol 12(1):161\u2013166","journal-title":"Impact Control Technol"},{"issue":"2","key":"1305_CR5","first-page":"195","volume":"17","author":"AK Barak","year":"2014","unstructured":"Barak AK, Barak MS, Malik SC (2014) Reliability analysis of a single-unit system with inspection subject to different weather conditions. J Stat Manag Syst 17(2):195\u2013206","journal-title":"J Stat Manag Syst"},{"issue":"1","key":"1305_CR6","first-page":"35","volume":"14","author":"AK Barak","year":"2016","unstructured":"Barak AK, Barak MS (2016) Impact of abnormal weather conditions on various reliability measures of a repairable system with inspection. Thailand Stat 14(1):35\u201345","journal-title":"Thailand Stat"},{"issue":"1","key":"1305_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3103\/S0146411615010022","volume":"49","author":"VA Bogatyrev","year":"2015","unstructured":"Bogatyrev VA, Bogatyrev AV (2015) Functional reliability of a real-time redundant computational process in cluster architecture systems. Autom Control Comput Sci 49(1):46\u201356","journal-title":"Autom Control Comput Sci"},{"issue":"2","key":"1305_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s41872-018-0041-0","volume":"7","author":"MS Barak","year":"2018","unstructured":"Barak MS, Yadav D, Barak SK (2018) Stochastic analysis of two-unit redundant system with priority to inspection over repair. Life Cycle Reliab Saf Eng 7(2):71\u201379","journal-title":"Life Cycle Reliab Saf Eng"},{"issue":"2","key":"1305_CR9","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s10796-019-09952-8","volume":"23","author":"S Berger","year":"2019","unstructured":"Berger S, H\u00e4ckel B, H\u00e4fner L (2019) Organizing self-organizing systems: a terminology, taxonomy, and reference model for entities in cyber-physical production systems. Inf Syst Front 23(2):391\u2013414","journal-title":"Inf Syst Front"},{"unstructured":"Cardenas A, Amin S, Sinopoli B, Giani A, Perrig A, & Sastry S (2009) Challenges for securing cyber physical systems. In: Workshop on future directions in cyber-physical systems security\u00a0(Vol. 5, No. 1)","key":"1305_CR10"},{"doi-asserted-by":"crossref","unstructured":"Chen JC, & Wu YJ (2020). Discrete-time Markov chain for prediction of air quality index.\u00a0J Ambient Intell Humaniz Comput, 1\u201310","key":"1305_CR11","DOI":"10.1007\/s12652-020-02036-5"},{"issue":"3","key":"1305_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s12652-010-0015-1","volume":"1","author":"XQ Cao","year":"2010","unstructured":"Cao XQ, Liu ZQ (2010) Human motion detection using Markov random fields. J Ambient Intell Humaniz Comput 1(3):211\u2013220","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"1305_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1080\/03772063.1989.11436801","volume":"35","author":"R Chellappa","year":"1989","unstructured":"Chellappa R (1989) Two-dimensional discrete Gaussian Markov random field models for image processing. IETE J Res 35(2):114\u2013120","journal-title":"IETE J Res"},{"issue":"19","key":"1305_CR14","doi-asserted-by":"publisher","first-page":"2252","DOI":"10.3390\/rs11192252","volume":"11","author":"F Casta\u00f1o","year":"2019","unstructured":"Casta\u00f1o F, Strzelczak S, Villalonga A, Haber RE, Kossakowska J (2019) Sensor reliability in cyber-physical systems using internet-of-things data: a review and case study. Remote Sensing 11(19):2252","journal-title":"Remote Sensing"},{"doi-asserted-by":"crossref","unstructured":"Deveerasetty KK, Zhou Y, Kamal S, & Nagar SK (2019) Computation of impulse-response Gramian for interval systems.\u00a0IETE J Res, 1\u201315","key":"1305_CR15","DOI":"10.1080\/03772063.2019.1690592"},{"issue":"3","key":"1305_CR16","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/0951-8320(93)90005-J","volume":"39","author":"JB Dugan","year":"1993","unstructured":"Dugan JB, Bavuso SJ, Boyd MA (1993) Fault trees and Markov models for reliability analysis of fault-tolerant digital systems. Reliab Eng Syst Saf 39(3):291\u2013307","journal-title":"Reliab Eng Syst Saf"},{"issue":"9","key":"1305_CR17","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.optm.2011.01.012","volume":"82","author":"GB Erickson","year":"2011","unstructured":"Erickson GB, Citek K, Cove M, Wilczek J, Linster C, Bjarnason B, Langemo N (2011) Reliability of a computer-based system for measuring visual performance skills. Optomet-J Am Optomet Assoc 82(9):528\u2013542","journal-title":"Optomet-J Am Optomet Assoc"},{"issue":"4","key":"1305_CR18","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s12652-016-0431-y","volume":"8","author":"FJ Ferrandez-Pastor","year":"2017","unstructured":"Ferrandez-Pastor FJ, Mora-Mora H, S\u00e1nchez-Romero JL, Nieto-Hidalgo M, Garc\u00eda-Chamizo JM (2017) Interpreting human activity from electrical consumption data using reconfigurable hardware and hidden Markov models. J Ambient Intell Humaniz Comput 8(4):469\u2013483","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"1305_CR19","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1023\/A:1010124927175","volume":"1","author":"M Fritzsche","year":"2000","unstructured":"Fritzsche M, L\u00f6hlein O (2000) Sensor fusion for the detection of landmines. Subsurf Sens Technol Appl 1(2):247\u2013267","journal-title":"Subsurf Sens Technol Appl"},{"issue":"1","key":"1305_CR20","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1080\/03772063.2017.1344109","volume":"64","author":"S Ghosh","year":"2018","unstructured":"Ghosh S, Ghosh D, Mohanta DK (2018) Functional uncertainty analysis of phasor measurement unit using fuzzy hidden markov model. IETE J Res 64(1):100\u2013107","journal-title":"IETE J Res"},{"doi-asserted-by":"crossref","unstructured":"Gupta N, Garg R, & Kumar P (2019). Characterization studies of dual-input single-output converters for PV applications.\u00a0IETE J Res, 1\u201312","key":"1305_CR21","DOI":"10.1080\/03772063.2019.1644212"},{"issue":"6","key":"1305_CR22","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1080\/03772063.2017.1369909","volume":"64","author":"R Havangi","year":"2018","unstructured":"Havangi R (2018) Target tracking based on improved unscented particle filter with Markov chain Monte Carlo. IETE J Res 64(6):873\u2013885","journal-title":"IETE J Res"},{"issue":"6","key":"1305_CR23","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed A, Lin J, Li F, Luo B (2017) Cyber-physical systems security: a survey. IEEE Internet Things J 4(6):1802\u20131831","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"1305_CR24","doi-asserted-by":"publisher","first-page":"3432","DOI":"10.1109\/TCYB.2018.2815758","volume":"48","author":"X Huang","year":"2018","unstructured":"Huang X, Dong J (2018) Reliable control policy of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks. IEEE Trans Cybern 48(12):3432\u20133439","journal-title":"IEEE Trans Cybern"},{"key":"1305_CR25","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-0-85729-204-9","volume-title":"Software reliability assessment with OR applications","author":"PK Kapur","year":"2011","unstructured":"Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR applications. Springer, London, p 364"},{"key":"1305_CR26","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.procs.2017.01.149","volume":"104","author":"I Kabashkin","year":"2017","unstructured":"Kabashkin I, Kundler J (2017) Reliability of sensor nodes in wireless sensor networks of cyber physical systems. Procedia Comput Sci 104:380\u2013384","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"1305_CR27","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s42044-018-0011-8","volume":"1","author":"A Kumar","year":"2018","unstructured":"Kumar A, Saini M (2018) Profit analysis of a computer system with preventive maintenance and priority subject to maximum operation and repair times. Iran J Comput Sci 1(3):147\u2013153","journal-title":"Iran J Comput Sci"},{"key":"1305_CR28","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.procs.2015.03.114","volume":"45","author":"A Kumar","year":"2015","unstructured":"Kumar A, Saini M, Malik SC (2015) Performance analysis of a computer system with imperfect fault detection of hardware. Procedia Comput Sci 45:602\u2013610","journal-title":"Procedia Comput Sci"},{"doi-asserted-by":"crossref","unstructured":"Kumar I, Kumar A, & Saini M (2020). Analysis of performance measures of computer systems with priority and maximum operation time. In\u00a0Information and communication technology for sustainable development. Springer, Singapore. pp. 1\u201311","key":"1305_CR30","DOI":"10.1007\/978-981-13-7166-0_1"},{"issue":"1","key":"1305_CR31","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TR.2013.2240891","volume":"62","author":"R Mitchell","year":"2013","unstructured":"Mitchell R, Chen R (2013) Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans Reliab 62(1):199\u2013210","journal-title":"IEEE Trans Reliab"},{"doi-asserted-by":"crossref","unstructured":"Margherita EG, & Braccini AM (2020) Industry 4.0 technologies in flexible manufacturing for sustainable organizational value: reflections from a multiple case study of Italian manufacturers.\u00a0Inf Syst Front, 1\u201322","key":"1305_CR32","DOI":"10.1007\/s10796-020-10047-y"},{"issue":"1","key":"1305_CR33","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MC.2006.31","volume":"39","author":"V Narayanan","year":"2006","unstructured":"Narayanan V, Xie Y (2006) Reliability concerns in embedded system designs. Computer 39(1):118\u2013120","journal-title":"Computer"},{"issue":"1","key":"1305_CR34","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1080\/03772063.1988.11436710","volume":"34","author":"S Nakagawa","year":"1988","unstructured":"Nakagawa S, Nakanishi H (1988) Speaker-independent English consonant and Japanese word recognition by a stochastic dynamic time warping method. IETE J Res 34(1):87\u201395","journal-title":"IETE J Res"},{"doi-asserted-by":"crossref","unstructured":"Nimmy SF, Sarowar MG, Dey N, Ashour AS, & Santosh KC (2018) Investigation of DNA discontinuity for detecting tuberculosis.\u00a0J Ambient Intelli Humaniz Comput, 1\u201315","key":"1305_CR35","DOI":"10.1007\/s12652-018-0878-0"},{"issue":"2\u20133","key":"1305_CR36","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1080\/03772063.2006.11416454","volume":"52","author":"KAA Omer","year":"2006","unstructured":"Omer KAA, Lobiyal DK (2006) Efficient grid location service scheme for MANET. IETE J Res 52(2\u20133):177\u2013185","journal-title":"IETE J Res"},{"issue":"10\u201311","key":"1305_CR37","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/s00607-012-0227-7","volume":"95","author":"S Parvin","year":"2013","unstructured":"Parvin S, Hussain FK, Hussain OK, Thein T, Park JS (2013) Multi-cyber framework for availability enhancement of cyber physical systems. Computing 95(10\u201311):927\u2013948","journal-title":"Computing"},{"doi-asserted-by":"crossref","unstructured":"Rahimifar A, Kavian YS, Kaabi H, & Soroosh M (2020) Predicting the energy consumption in software defined wireless sensor networks: a probabilistic Markov model approach.\u00a0J Ambient Intell Humaniz Comput, 1\u201314","key":"1305_CR38","DOI":"10.1007\/s12652-020-02599-3"},{"doi-asserted-by":"crossref","unstructured":"Sridhar D, & Chandrasekar C (2020) Fuzzy signal strength estimated Markov probabilistic graph for efficient handover and seamless data delivery in PAN.\u00a0J Ambient Intell Humaniz Comput, 1\u201314","key":"1305_CR39","DOI":"10.1007\/s12652-020-02034-7"},{"issue":"2","key":"1305_CR40","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s41872-020-00114-3","volume":"9","author":"M Saini","year":"2020","unstructured":"Saini M, Kumar A, Shankar VG (2020) A study of microprocessor systems using RAMD approach. Life Cycle Reliab Saf Eng 9(2):181\u2013194","journal-title":"Life Cycle Reliab Saf Eng"},{"doi-asserted-by":"crossref","unstructured":"Singh C, & Sprintson A (2010) Reliability assurance of cyber-physical power systems. In: IEEE PES general meeting\u00a0(pp. 1\u20136). IEEE","key":"1305_CR41","DOI":"10.1109\/PES.2010.5590189"},{"doi-asserted-by":"crossref","unstructured":"Siergiejczyk M, Krzykowska K, Rosinski A, & Grieco LA (2017) Reliability and viewpoints of selected ITS system. In: 2017 25th International conference on systems engineering (ICSEng)\u00a0(pp. 141\u2013146). IEEE","key":"1305_CR42","DOI":"10.1109\/ICSEng.2017.68"},{"issue":"4","key":"1305_CR43","first-page":"349","volume":"100","author":"G Saranraj","year":"2019","unstructured":"Saranraj G, Selvamani K, Kanagachidambaresan GR (2019) Optimal energy-efficient cluster head selection (OEECHS) for wireless sensor network. J Inst Eng (India): Series B 100(4):349\u2013356","journal-title":"J Inst Eng (India): Series B"},{"issue":"12","key":"1305_CR44","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1080\/03772063.1970.11486691","volume":"16","author":"H Singh","year":"1970","unstructured":"Singh H, Puri SC (1970) On the determination of markov parameters for the realization of a class of transfer function matrices. IETE J Res 16(12):895\u2013898","journal-title":"IETE J Res"},{"issue":"3","key":"1305_CR45","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s11220-004-0986-0","volume":"5","author":"P Torrione","year":"2004","unstructured":"Torrione P, Collins L (2004) Performance comparison of automated induction-based algorithms for landmine detection in a blind field test. Subsurf Sens Technol Appl 5(3):121\u2013150","journal-title":"Subsurf Sens Technol Appl"},{"issue":"1","key":"1305_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-018-0196-9","volume":"19","author":"B Tu","year":"2018","unstructured":"Tu B, Zhang X, Wang J, Zhang G, Ou X (2018) Spectral\u2013spatial hyperspectral image classification via non-local means filtering feature extraction. Sensing Imaging 19(1):1\u201325","journal-title":"Sensing Imaging"},{"issue":"2","key":"1305_CR47","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/03772063.2015.1083898","volume":"62","author":"MR Usman","year":"2016","unstructured":"Usman MR, Shin SY (2016) Channel allocation schemes for permanent user channel assignment in wireless cellular networks. IETE J Res 62(2):189\u2013197","journal-title":"IETE J Res"},{"unstructured":"Varuna WR, & Vadivel R (2020) Design of an effectual node balancing cluster with partitioner algorithm using Markov decision process.\u00a0J Ambient Intell Humaniz Comput, 1\u20139","key":"1305_CR48"},{"doi-asserted-by":"crossref","unstructured":"Wang EK, Ye Y, Xu X, Yiu SM, Hui LCK, & Chow KP (2010) Security issues and challenges for cyber physical system. In: 2010 IEEE\/ACM Int'l conference on green computing and communications & Int'l conference on cyber, Physical and Social Computing\u00a0(pp. 733\u2013738). IEEE","key":"1305_CR49","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"issue":"11","key":"1305_CR50","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1016\/j.jfranklin.2016.04.011","volume":"353","author":"D Wang","year":"2016","unstructured":"Wang D, Wang Z, Shen B, Alsaadi FE, Hayat T (2016) Recent advances on filtering and control for cyber-physical systems under security and resource constraints. J Franklin Inst 353(11):2451\u20132466","journal-title":"J Franklin Inst"},{"issue":"12","key":"1305_CR51","doi-asserted-by":"publisher","first-page":"5447","DOI":"10.1109\/TII.2018.2854762","volume":"14","author":"G Xie","year":"2018","unstructured":"Xie G, Peng H, Li Z, Song J, Xie Y, Li R, Li K (2018) Reliability enhancement toward functional safety goal assurance in energy-aware automotive cyber-physical systems. IEEE Trans Industr Inf 14(12):5447\u20135462","journal-title":"IEEE Trans Industr Inf"},{"unstructured":"Yousefi HHN, Kavian Y, & Mahmoudi A (2021) A Markov chain model for IEEE 802.15. 4 in time critical wireless sensor networks under periodic traffic with reneging packets.\u00a0J Ambient Intell Humaniz Comput, 1\u201316","key":"1305_CR52"},{"issue":"6","key":"1305_CR53","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1007\/s12652-017-0501-9","volume":"8","author":"J Yu","year":"2017","unstructured":"Yu J, Xie L, Xiao X, Chng ES (2017) A hybrid neural network hidden Markov model approach for automatic story segmentation. J Ambient Intell Humaniz Comput 8(6):925\u2013936","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"1305_CR54","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10796-006-8731-y","volume":"8","author":"N Ye","year":"2006","unstructured":"Ye N, Farley T, Lakshminarasimhan D (2006) An attack-norm separation approach for detecting cyber attacks. Inf Syst Front 8(3):163\u2013177","journal-title":"Inf Syst Front"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01305-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01305-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01305-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T08:27:56Z","timestamp":1635496076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01305-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,4]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1305"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01305-6","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2021,9,4]]},"assertion":[{"value":"28 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Our submission entitled \"Cyber Physical Systems- Reliability Modelling: Critical Perspective and its Impact\" has \u201cCompliance with Ethical Standards\u201d. There are no potential conflicts of interest among authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"There is no involvement of human participants and\/or animals in our research work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}]}}