{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T04:30:18Z","timestamp":1771993818549,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030853464","type":"print"},{"value":"9783030853471","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85347-1_24","type":"book-chapter","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T09:06:54Z","timestamp":1630055214000},"page":"325-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Proposal for the Classification of Methods for Verification and Validation of Safety, Cybersecurity, and Privacy of Automated Systems"],"prefix":"10.1007","author":[{"given":"Jose Luis","family":"de la Vara","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Bauer","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Karaca","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Matschnig","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Mazzini","sequence":"additional","affiliation":[]},{"given":"Giann Spilere","family":"Nandi","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Patrone","sequence":"additional","affiliation":[]},{"given":"David","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Proen\u00e7a","sequence":"additional","affiliation":[]},{"given":"Rupert","family":"Schlick","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tonetta","sequence":"additional","affiliation":[]},{"given":"Ugur","family":"Yayan","sequence":"additional","affiliation":[]},{"given":"Behrooz","family":"Sangchoolie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"24_CR1","unstructured":"Amalthea4public project: D3.1 - Analysis of state of the art V&V techniques (2015)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-030-29959-0_33","volume-title":"Computer Security \u2013 ESORICS 2019","author":"E Arfelt","year":"2019","unstructured":"Arfelt, E., Basin, D., Debois, S.: Monitoring the GDPR. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 681\u2013699. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_33"},{"key":"24_CR3","unstructured":"Avizienis, A., et al.: Fundamental concepts of dependability. University of Newcastle (2001)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Barbosa, R., et al.: The VALU3S ECSEL project: verification and validation of automated systems safety and security. In: DSD 2020 (2020)","DOI":"10.1109\/DSD51259.2020.00064"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-30446-1_4","volume-title":"Software Engineering and Formal Methods","author":"E Bartocci","year":"2019","unstructured":"Bartocci, E., Manjunath, N., Mariani, L., Mateis, C., Ni\u010dkovi\u0107, D.: Automatic failure explanation in CPS models. In: \u00d6lveczky, P.C., Sala\u00fcn, G. (eds.) SEFM 2019. LNCS, vol. 11724, pp. 69\u201386. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30446-1_4"},{"issue":"3","key":"24_CR6","doi-asserted-by":"publisher","first-page":"908","DOI":"10.3390\/s21030908","volume":"21","author":"L Belmonte","year":"2021","unstructured":"Belmonte, L., et al.: Feeling of safety and comfort towards a socially assistive unmanned aerial vehicle that monitors people in a virtual home. Sensors 21(3), 908 (2021)","journal-title":"Sensors"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-319-21690-4_41","volume-title":"Computer Aided Verification","author":"M Bozzano","year":"2015","unstructured":"Bozzano, M., Cimatti, A., Griggio, A., Mattarei, C.: Efficient anytime techniques for model-based safety analysis. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 603\u2013621. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21690-4_41"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Cassar, I., et al: A survey of runtime monitoring instrumentation techniques. PrePost@iFM (2017)","DOI":"10.4204\/EPTCS.254.2"},{"key":"24_CR9","unstructured":"CENELEC: EN 50128 - Railway applications - Communication, signalling and processing systems - Software for railway control and protection systems (2020)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-030-32079-9_10","volume-title":"Runtime Verification","author":"A Cimatti","year":"2019","unstructured":"Cimatti, A., Tian, C., Tonetta, S.: Assumption-based runtime verification with partial observability and resets. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 165\u2013184. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_10"},{"key":"24_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8","volume-title":"Handbook of Model Checking","author":"EM Clarke","year":"2018","unstructured":"Clarke, E.M., et al.: Handbook of Model Checking. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-10575-8"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"110812","DOI":"10.1016\/j.jss.2020.110812","volume":"171","author":"JL de la Vara","year":"2021","unstructured":"de la Vara, J.L., et al.: Assurance and certification of cyber-physical systems: the AMASS open source ecosystem. J. Syst. Softw. 171, 110812 (2021)","journal-title":"J. Syst. Softw."},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Dias, R., et al.: Verifying concurrent programs using contracts. In: ICST 2017 (2017)","DOI":"10.1109\/ICST.2017.25"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/11556114_3","volume-title":"Spatial Information Theory","author":"M Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: Simulation of obfuscation and negotiation for location privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31\u201348. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11556114_3"},{"issue":"2","key":"24_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TDSC.2013.37","volume":"11","author":"J Fonseca","year":"2014","unstructured":"Fonseca, J., et al.: Analysis of field data on web security vulnerabilities. IEEE Trans. Dependable Secure Comput. 11(2), 89\u2013100 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"24_CR16","unstructured":"Gallina, B., et al.: Multi\u2010concern dependability\u2010centered assurance for space systems via ConcertoFLA. Ada-Europe (2018)"},{"key":"24_CR17","unstructured":"Halfind, W.G.J., et al.: A classification of SQL injection attacks and countermeasures. In: ISSSE 2006 (2006)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Herdt, V., et al.: Efficient cross-level testing for processor verification: a RISC-V case-study. In: FDL 2020 (2020)","DOI":"10.1109\/FDL50818.2020.9232941"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Humbatova, N., et al.: Taxonomy of real faults in deep learning systems. In: ICSE 2020 (2020)","DOI":"10.1145\/3377811.3380395"},{"key":"24_CR20","unstructured":"IEC: IEC 61508 - Functional safety of electrical\/electronic\/programmable electronic safety-related systems (2011)"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-91908-9_18","volume-title":"Computing and Software Science","author":"R H\u00e4hnle","year":"2019","unstructured":"H\u00e4hnle, R., Huisman, M.: Deductive software verification: from pen-and-paper proofs to industrial tools. In: Steffen, B., Woeginger, G. (eds.) Computing and Software Science. LNCS, vol. 10000, pp. 345\u2013373. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-91908-9_18"},{"key":"24_CR22","unstructured":"IEEE: IEEE Std 1012 - IEEE Standard for System, Software, and Hardware V&V (2016)"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Kammueller, F.: Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. In: SMC 2018 (2018)","DOI":"10.1109\/SMC.2018.00562"},{"issue":"1","key":"24_CR24","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/3146389","volume":"51","author":"E Khalastchi","year":"2018","unstructured":"Khalastchi, E., Kalech, M.: On fault detection and diagnosis in robotic systems. ACM Comput. Surv. 51(1), 9 (2018)","journal-title":"ACM Comput. Surv."},{"key":"24_CR25","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-030-59155-7_25","volume-title":"Software Architecture","author":"T Kuhn","year":"2020","unstructured":"Kuhn, T., Antonino, P.O., Bachorek, A.: A simulator coupling architecture for the creation of digital twins. In: Muccini, H., et al. (eds.) ECSA 2020. CCIS, vol. 1269, pp. 326\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59155-7_25"},{"key":"24_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/9781119130161","volume-title":"Model-Based Testing Essentials","author":"A Kramer","year":"2016","unstructured":"Kramer, A., Legeard, B.: Model-Based Testing Essentials. Wiley, Hoboken (2016)"},{"key":"24_CR27","unstructured":"Laskey, M., et al.: DART: noise injection for robust imitation learning. In: CoRL 2017 (2017)"},{"issue":"5","key":"24_CR28","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/3342355","volume":"52","author":"M Luckcuck","year":"2019","unstructured":"Luckcuck, M., et al.: Formal specification and verification of autonomous robotic systems: a survey. ACM Comput. Surv. 52(5), 100 (2019)","journal-title":"ACM Comput. Surv."},{"issue":"7","key":"24_CR29","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.infsof.2014.03.001","volume":"56","author":"S Nair","year":"2014","unstructured":"Nair, S., et al.: An extended systematic literature review on provision of evidence for safety certification. Inf. Softw. Technol. 56(7), 689\u2013717 (2014)","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"24_CR30","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2841425","volume":"48","author":"R Natella","year":"2016","unstructured":"Natella, R., et al.: Assessing dependability with software fault injection: a survey. ACM Comput. Surv. 48(3), 44 (2016)","journal-title":"ACM Comput. Surv."},{"key":"24_CR31","unstructured":"Oxford UK Dictionary: method (2021). https:\/\/www.lexico.com\/definition\/method"},{"key":"24_CR32","first-page":"30","volume":"36","author":"L Pan","year":"2017","unstructured":"Pan, L., et al.: Cyber security attacks to modern vehicular systems. J. Inf. Secur. Appl. 36, 30\u2013100 (2017)","journal-title":"J. Inf. Secur. Appl."},{"key":"24_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-33220-4_2","volume-title":"Semantic Systems. The Power of AI and Knowledge Graphs","author":"HJ Pandit","year":"2019","unstructured":"Pandit, H.J., O\u2019Sullivan, D., Lewis, D.: Test-driven approach towards GDPR compliance. In: Acosta, M., Cudr\u00e9-Mauroux, P., Maleshkova, M., Pellegrini, T., Sack, H., Sure-Vetter, Y. (eds.) SEMANTiCS 2019. LNCS, vol. 11702, pp. 19\u201333. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33220-4_2"},{"key":"24_CR34","doi-asserted-by":"crossref","unstructured":"Parra, E., et al.: Advances in artefact quality analysis for safety-critical systems. In: ISSRE 2019 (2019)","DOI":"10.1109\/ISSREW.2019.00047"},{"key":"24_CR35","doi-asserted-by":"crossref","unstructured":"Paz, A., El Boussaidi, G.: A requirements modelling language to facilitate avionics software verification and certification. In: RET 2019 (2019)","DOI":"10.1109\/RET.2019.00008"},{"key":"24_CR36","unstructured":"Rival, X., Yi, K.: Introduction to Static Analysis. An Abstract Interpretation Perspective. MIT Press (2020)"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Sangchoolie, B., et al.: A study of the interplay between safety and security using model-implemented fault injection. In: EDCC 2018 (2018)","DOI":"10.1109\/EDCC.2018.00018"},{"key":"24_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-319-22969-0_10","volume-title":"Software Engineering and Formal Methods","author":"A Savary","year":"2015","unstructured":"Savary, A., Frappier, M., Leuschel, M., Lanet, J.-L.: Model-based robustness testing in event-B using mutation. In: Calinescu, R., Rumpe, B. (eds.) SEFM 2015. LNCS, vol. 9276, pp. 132\u2013147. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22969-0_10"},{"key":"24_CR39","doi-asserted-by":"crossref","unstructured":"Skoglund, M., et al.: Black-box testing for security-informed safety of automated driving systems. In: VTC 2021-Spring (2021)","DOI":"10.1109\/VTC2021-Spring51267.2021.9448691"},{"key":"24_CR40","doi-asserted-by":"crossref","unstructured":"Timperley, C.S., et al.: Crashing simulated planes is cheap: Can simulation detect robotics bugs early? In: ICST 2018 (2018)","DOI":"10.1109\/ICST.2018.00040"},{"issue":"2","key":"24_CR41","doi-asserted-by":"publisher","first-page":"177","DOI":"10.3934\/naco.2019047","volume":"10","author":"VA Tsachouridis","year":"2020","unstructured":"Tsachouridis, V.A., et al.: Formal analysis of the Schulz matrix inversion algorithm: a paradigm towards computer aided verification of general matrix flow solvers. Numer. Algebra Control Optim. 10(2), 177\u2013206 (2020)","journal-title":"Numer. Algebra Control Optim."},{"key":"24_CR42","unstructured":"US DoD: Defense Modeling & Simulation Coordination Office, V&V Technique Taxonomy (2001). https:\/\/vva.msco.mil\/default.htm?Ref_Docs\/VVTechniques\/"},{"key":"24_CR43","unstructured":"VALU3S project: D3.1 - V&V methods for SCP evaluation of automated systems (2021)"},{"key":"24_CR44","doi-asserted-by":"crossref","unstructured":"Yang, Y., et al.: Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems. In: SUPERGEN 2012 (2012)","DOI":"10.1049\/cp.2012.1831"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85347-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T09:15:20Z","timestamp":1630055720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85347-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030853464","9783030853471"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85347-1_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Algarve","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2021.quatic.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}