{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:15:10Z","timestamp":1775366110841,"version":"3.50.1"},"reference-count":73,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011688","name":"Electronic Components and Systems for European Leadership","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010665","name":"H2020 Marie Sk\u0142odowska-Curie Actions","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["2020W3A5FY"],"award-info":[{"award-number":["2020W3A5FY"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Languages"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.cola.2023.101243","type":"journal-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T08:05:07Z","timestamp":1700640307000},"page":"101243","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Supporting model-based safety analysis for safety-critical IoT systems"],"prefix":"10.1016","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4463-6268","authenticated-orcid":false,"given":"Felicien","family":"Ihirwe","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5077-6793","authenticated-orcid":false,"given":"Davide","family":"Di Ruscio","sequence":"additional","affiliation":[]},{"given":"Katia","family":"Di Blasio","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Gianfranceschi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5231-3952","authenticated-orcid":false,"given":"Alfonso","family":"Pierantonio","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.cola.2023.101243_b1","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MS.2017.26","article-title":"A roadmap to the programmable world: Software challenges in the IoT era","volume":"34","author":"Taivalsaari","year":"2017","journal-title":"IEEE Softw."},{"key":"10.1016\/j.cola.2023.101243_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2021.111087","article-title":"MontiThings: Model-driven development and deployment of reliable IoT applications","volume":"183","author":"Kirchhof","year":"2022","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.cola.2023.101243_b3","series-title":"Proceedings of the 9th International Conference on the Internet of Things","article-title":"Providing fault tolerance via complex event processing and machine learning for IoT systems","author":"Power","year":"2019"},{"key":"10.1016\/j.cola.2023.101243_b4","series-title":"Proceedings of the 23rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings","article-title":"Low-code engineering for internet of things: A state of research","author":"Ihirwe","year":"2020"},{"key":"10.1016\/j.cola.2023.101243_b5","first-page":"1","article-title":"Model-driven development of asynchronous message-driven architectures with AsyncAPI","author":"G\u00f3mez","year":"2021","journal-title":"Softw. Syst. Model."},{"key":"10.1016\/j.cola.2023.101243_b6","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.anucene.2018.05.027","article-title":"Dependability analysis of safety critical systems: Issues and challenges","volume":"120","author":"kamal Kaur","year":"2018","journal-title":"Ann. Nucl. Energy"},{"key":"10.1016\/j.cola.2023.101243_b7","series-title":"Guidelines for development of civil aircraft and systems","author":"Aircraft","year":"2010"},{"key":"10.1016\/j.cola.2023.101243_b8","doi-asserted-by":"crossref","first-page":"204","DOI":"10.4236\/jsea.2018.115013","article-title":"Automatic derivation of fault tree models from SysML models for safety analysis","volume":"11","author":"Alshboul","year":"2018","journal-title":"J. Softw. Eng. Appl."},{"key":"10.1016\/j.cola.2023.101243_b9","series-title":"2020 AIAA\/IEEE 39th Digital Avionics Systems Conference","first-page":"1","article-title":"Model based safety analysis (MBSA) tool for avionics systems evaluation","author":"Abdellatif","year":"2020"},{"key":"10.1016\/j.cola.2023.101243_b10","series-title":"24th Digital Avionics Systems Conference, Vol. 2","first-page":"13","article-title":"A proposal for model-based safety analysis","author":"Joshi","year":"2005"},{"key":"10.1016\/j.cola.2023.101243_b11","doi-asserted-by":"crossref","unstructured":"G. Girard, I. Baeriswyl, J.J. Hendriks, R. Scherwey, C. M\u00fcller, P. H\u00f6nig, R. Lunde, Model based safety analysis using SysML with automatic generation of FTA and FMEA artifacts, in: Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference, Esrel 2020 PSAM 15, 1\u20135 November 2020, Venice, Italy, 2020.","DOI":"10.3850\/978-981-14-8593-0_4941-cd"},{"key":"10.1016\/j.cola.2023.101243_b12","series-title":"Models in Software Engineering","first-page":"229","article-title":"FPTC: Automated safety analysis for domain-specific languages","author":"Paige","year":"2009"},{"key":"10.1016\/j.cola.2023.101243_b13","series-title":"Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD","first-page":"262","article-title":"Model-based analysis support for dependable complex systems in CHESS","author":"Debiasi","year":"2021"},{"key":"10.1016\/j.cola.2023.101243_b14","series-title":"2013 28th IEEE\/ACM International Conference on Automated Software Engineering","first-page":"702","article-title":"OCRA: A tool for checking the refinement of temporal contracts","author":"Cimatti","year":"2013"},{"key":"10.1016\/j.cola.2023.101243_b15","series-title":"2009 IEEE\/IFIP International Conference on Dependable Systems & Networks","first-page":"353","article-title":"M\u00f6bius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models","author":"Courtney","year":"2009"},{"key":"10.1016\/j.cola.2023.101243_b16","series-title":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","first-page":"233","article-title":"A model-driven dependability analysis method for component-based architectures","author":"Gallina","year":"2012"},{"key":"10.1016\/j.cola.2023.101243_b17","series-title":"Space Product Assurance - Fault Tree Analysis - Adoption Notice ECSS\/IEC 61025","author":"ESA Requirements","year":"2008"},{"key":"10.1016\/j.cola.2023.101243_b18","series-title":"Failure Modes, Effects (and Criticality) Analysis (FMEA\/FMECA)","author":"ESA Requirements","year":"2009"},{"issue":"3","key":"10.1016\/j.cola.2023.101243_b19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.entcs.2005.02.051","article-title":"Modular architectural representation and analysis of fault propagation and transformation","volume":"141","author":"Wallace","year":"2005","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"10.1016\/j.cola.2023.101243_b20","doi-asserted-by":"crossref","unstructured":"B. Gallina, E. Sefer, A. Refsdal, Towards Safety Risk Assessment of Socio-Technical Systems via Failure Logic Analysis, in: ISSRE Workshops, 2014, pp. 287\u2013292.","DOI":"10.1109\/ISSREW.2014.49"},{"issue":"1","key":"10.1016\/j.cola.2023.101243_b21","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.joes.2017.11.005","article-title":"Fuzzy fault tree analysis of oil and gas leakage in subsea production systems","volume":"3","author":"Cheliyan","year":"2018","journal-title":"J. Ocean Eng. Sci."},{"issue":"15","key":"10.1016\/j.cola.2023.101243_b22","doi-asserted-by":"crossref","DOI":"10.3390\/app11156731","article-title":"Application of FTA analysis for calculation of the probability of the failure of the pressure leaching process","volume":"11","author":"Markulik","year":"2021","journal-title":"Appl. Sci."},{"issue":"4","key":"10.1016\/j.cola.2023.101243_b23","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.psep.2009.04.004","article-title":"Methodology for computer aided fuzzy fault tree analysis","volume":"87","author":"Ferdous","year":"2009","journal-title":"Process Saf. Environ. Protect."},{"key":"10.1016\/j.cola.2023.101243_b24","series-title":"Failure Mode and Effect Analysis: FMEA from Theory to Execution","author":"Stamatis","year":"2003"},{"key":"10.1016\/j.cola.2023.101243_b25","series-title":"High-Integrity System Specification and Design","first-page":"359","article-title":"Real-time and safety-critical systems","author":"Ostroff","year":"1999"},{"key":"10.1016\/j.cola.2023.101243_b26","series-title":"Proceedings of the 24th International Conference on Software Engineering","first-page":"547","article-title":"Safety critical systems: Challenges and directions","author":"Knight","year":"2002"},{"issue":"4","key":"10.1016\/j.cola.2023.101243_b27","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/332051.332078","article-title":"The ethics of safety-critical systems","volume":"43","author":"Bowen","year":"2000","journal-title":"Commun. ACM"},{"issue":"8","key":"10.1016\/j.cola.2023.101243_b28","doi-asserted-by":"crossref","DOI":"10.3390\/app10082670","article-title":"Machine learning approach in heterogeneous group of algorithms for transport safety-critical system","volume":"10","author":"An","year":"2020","journal-title":"Appl. Sci."},{"issue":"1","key":"10.1016\/j.cola.2023.101243_b29","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","article-title":"Basic concepts and taxonomy of dependable and secure computing","volume":"1","author":"Avizienis","year":"2004","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"10.1016\/j.cola.2023.101243_b30","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MS.2017.1","article-title":"Model-driven engineering for mission-critical IoT systems","volume":"34","author":"Ciccozzi","year":"2017","journal-title":"IEEE Softw."},{"issue":"11","key":"10.1016\/j.cola.2023.101243_b31","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MC.2003.1244533","article-title":"Designing safety-critical computer systems","volume":"36","author":"Dunn","year":"2003","journal-title":"Computer"},{"key":"10.1016\/j.cola.2023.101243_b32","series-title":"STAF Workshops","first-page":"90","article-title":"Towards a modeling and analysis environment for industrial IoT systems","author":"Ihirwe","year":"2021"},{"issue":"2","key":"10.1016\/j.cola.2023.101243_b33","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MS.2020.3041522","article-title":"What is the future of modeling?","volume":"38","author":"Bucchiarone","year":"2021","journal-title":"IEEE Softw."},{"key":"10.1016\/j.cola.2023.101243_b34","series-title":"Formal Methods for Model-Driven Engineering: 12th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2012, Bertinoro, Italy, June 18-23, 2012. Advanced Lectures","first-page":"91","article-title":"Model transformations","author":"Di Ruscio","year":"2012"},{"key":"10.1016\/j.cola.2023.101243_b35","series-title":"Intelligent Distributed Computing X","first-page":"67","article-title":"MDE4IoT: Supporting the Internet of Things with model-driven engineering","author":"Ciccozzi","year":"2017"},{"key":"10.1016\/j.cola.2023.101243_b36","series-title":"Proceedings of the ACM\/IEEE 19th International Conference on Model Driven Engineering Languages and Systems","first-page":"125","article-title":"ThingML: A language and code generation framework for heterogeneous targets","author":"Harrand","year":"2016"},{"key":"10.1016\/j.cola.2023.101243_b37","series-title":"Oct 2019 4th International Conference on Computing, Com and Security","article-title":"BRAIN-IoT: Model-based framework for dependable sensing and actuation in intelligent decentralized IoT systems","author":"Conzon","year":"2019"},{"key":"10.1016\/j.cola.2023.101243_b38","series-title":"2021 ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems Companion","first-page":"73","article-title":"Cloud-based modeling in IoT domain: a survey, open challenges and opportunities","author":"Ihirwe","year":"2021"},{"key":"10.1016\/j.cola.2023.101243_b39","series-title":"A domain specific modeling and analysis environment for complex IoT applications","author":"Ihirwe","year":"2021"},{"key":"10.1016\/j.cola.2023.101243_b40","series-title":"Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies","first-page":"191","article-title":"IotSan: Fortifying the safety of IoT systems","author":"Nguyen","year":"2018"},{"key":"10.1016\/j.cola.2023.101243_b41","series-title":"2021 17th European Dependable Computing Conference","first-page":"25","article-title":"FaultFlow: a tool supporting an MDE approach for timed failure logic analysis","author":"Parri","year":"2021"},{"key":"10.1016\/j.cola.2023.101243_b42","series-title":"2018 3rd International Conference on System Reliability and Safety","first-page":"176","article-title":"FLA2FT: Automatic generation of fault tree from ConcertoFLA results","author":"Haider","year":"2018"},{"key":"10.1016\/j.cola.2023.101243_b43","series-title":"Handbook of Performability Engineering","first-page":"595","article-title":"Fault tree analysis","author":"Xing","year":"2008"},{"key":"10.1016\/j.cola.2023.101243_b44","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.cosrev.2015.03.001","article-title":"Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools","volume":"15\u201316","author":"Ruijters","year":"2015","journal-title":"Comp. Sci. Rev."},{"key":"10.1016\/j.cola.2023.101243_b45","series-title":"2013 IEEE International Conference on Granular Computing","first-page":"353","article-title":"A combined analysis method of FMEA and FTA for improving the safety analysis quality of safety-critical software","author":"Han","year":"2013"},{"key":"10.1016\/j.cola.2023.101243_b46","series-title":"2008 11th IEEE High Assurance Systems Engineering Symposium","first-page":"283","article-title":"A comparative study into architecture-based safety evaluation methodologies using AADL\u2019s error annex and failure propagation models","author":"Grunske","year":"2008"},{"key":"10.1016\/j.cola.2023.101243_b47","series-title":"2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications","first-page":"493","article-title":"FI4FA: A formalism for incompletion, inconsistency, interference and impermanence failures\u2019 analysis","author":"Gallina","year":"2011"},{"key":"10.1016\/j.cola.2023.101243_b48","series-title":"Theory and Practice of Model Transformations","first-page":"46","article-title":"The epsilon transformation language","author":"Kolovos","year":"2008"},{"key":"10.1016\/j.cola.2023.101243_b49","series-title":"Reliability Based Aircraft Maintenance Optimization and Applications","first-page":"115","article-title":"Chapter 6 - Fault tree analysis for composite structural damage","author":"Ren","year":"2017"},{"key":"10.1016\/j.cola.2023.101243_b50","series-title":"Fault tree analysis in reliability workbench","author":"ISOGRAPH","year":"2022"},{"key":"10.1016\/j.cola.2023.101243_b51","series-title":"Tools and Algorithms for the Construction and Analysis of Systems","first-page":"533","article-title":"The xSAP safety analysis platform","author":"Bittner","year":"2016"},{"key":"10.1016\/j.cola.2023.101243_b52","series-title":"AltaRica 3.0: a Model-Based approach for Safety Analyses","author":"Prosvirnova","year":"2014"},{"issue":"2","key":"10.1016\/j.cola.2023.101243_b53","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/3092893.3092900","article-title":"Automated fault tree analysis from AADL models","volume":"36","author":"Feiler","year":"2017","journal-title":"Ada Lett."},{"key":"10.1016\/j.cola.2023.101243_b54","series-title":"Model-Based Safety and Assessment","first-page":"109","article-title":"A conceptual framework to incorporate complex basic events in HiP-HOPS","author":"Kabir","year":"2019"},{"key":"10.1016\/j.cola.2023.101243_b55","series-title":"Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings","first-page":"579","article-title":"Towards the adoption of model based system safety engineering in the automotive industry","author":"Chiang","year":"2022"},{"issue":"1","key":"10.1016\/j.cola.2023.101243_b56","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/4233.992168","article-title":"An open architecture patient monitoring system using standard technologies","volume":"6","author":"Varady","year":"2002","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"10.1016\/j.cola.2023.101243_b57","series-title":"2012 International Conference on Advances in Mobile Network, Communication and Its Applications","first-page":"87","article-title":"Efficient patient monitoring for multiple patients using WSN","author":"Megalingam","year":"2012"},{"key":"10.1016\/j.cola.2023.101243_b58","doi-asserted-by":"crossref","DOI":"10.1007\/s00607-020-00841-6","article-title":"A framework for model-driven engineering of resilient software-controlled systems","volume":"103","author":"Parri","year":"2021","journal-title":"Computing"},{"key":"10.1016\/j.cola.2023.101243_b59","series-title":"2014 IEEE\/ASME International Conference on Advanced Intelligent Mechatronics","first-page":"715","article-title":"Automatic fault tree generation from SysML system models","author":"Mhenni","year":"2014"},{"issue":"7","key":"10.1016\/j.cola.2023.101243_b60","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1016\/j.compeleceng.2013.04.021","article-title":"A dependability evaluation tool for the Internet of Things","volume":"39","author":"Silva","year":"2013","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.cola.2023.101243_b61","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1142\/S0219686718500075","article-title":"Fault tree analysis for reliability evaluation of an advanced complex manufacturing system","volume":"17","author":"Fazlollahtabar","year":"2018","journal-title":"J. Adv. Manuf. Syst."},{"key":"10.1016\/j.cola.2023.101243_b62","series-title":"2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop","first-page":"226","article-title":"Transformation of failure propagation models into fault trees for safety evaluation purposes","author":"Chaari","year":"2016"},{"key":"10.1016\/j.cola.2023.101243_b63","series-title":"Model-Based Safety and Assessment","first-page":"63","article-title":"Integrating existing safety analyses into SysML","author":"Clegg","year":"2019"},{"issue":"1","key":"10.1016\/j.cola.2023.101243_b64","doi-asserted-by":"crossref","DOI":"10.3390\/info8010007","article-title":"Model based safety analysis with smartiflow","volume":"8","author":"H\u00f6nig","year":"2017","journal-title":"Information"},{"key":"10.1016\/j.cola.2023.101243_b65","series-title":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","first-page":"241","article-title":"Automatic static fault tree analysis from system models","author":"Xiang","year":"2010"},{"issue":"1","key":"10.1016\/j.cola.2023.101243_b66","doi-asserted-by":"crossref","DOI":"10.3390\/s17010153","article-title":"Application of fault tree analysis and fuzzy neural networks to fault diagnosis in the internet of things (IoT) for aquaculture","volume":"17","author":"Chen","year":"2017","journal-title":"Sensors"},{"issue":"6","key":"10.1016\/j.cola.2023.101243_b67","doi-asserted-by":"crossref","first-page":"2047","DOI":"10.1109\/JIOT.2017.2749375","article-title":"Reliability modeling of Mesh Storage Area networks for internet of things","volume":"4","author":"Xing","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.cola.2023.101243_b68","series-title":"Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD","first-page":"210","article-title":"Model-based system engineering for fault tree generation and analysis","author":"Yakymets","year":"2013"},{"key":"10.1016\/j.cola.2023.101243_b69","series-title":"2020 Annual Reliability and Maintainability Symposium","first-page":"1","article-title":"Obtaining fault trees through sysml diagrams: A MBSE approach for reliability analysis","author":"Melani","year":"2020"},{"key":"10.1016\/j.cola.2023.101243_b70","series-title":"Computer Safety, Reliability, and Security","first-page":"85","article-title":"A sysml profile for fault trees\u2014Linking safety models to system design","author":"Clegg","year":"2019"},{"key":"10.1016\/j.cola.2023.101243_b71","series-title":"Computer Safety, Reliability and Security","first-page":"139","article-title":"Hierarchically performed hazard origin and propagation studies","author":"Papadopoulos","year":"1999"},{"key":"10.1016\/j.cola.2023.101243_b72","series-title":"Reliability analysis on crucial subsystems of a wind turbine through FTA approach","author":"Katsavounis","year":"2014"},{"key":"10.1016\/j.cola.2023.101243_b73","series-title":"Supporting early-safety analysis of IoT systems by exploiting testing techniques","author":"Clerissi","year":"2023"}],"container-title":["Journal of Computer Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590118423000539?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590118423000539?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T01:54:10Z","timestamp":1762912450000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590118423000539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":73,"alternative-id":["S2590118423000539"],"URL":"https:\/\/doi.org\/10.1016\/j.cola.2023.101243","relation":{},"ISSN":["2590-1184"],"issn-type":[{"value":"2590-1184","type":"print"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Supporting model-based safety analysis for safety-critical IoT systems","name":"articletitle","label":"Article Title"},{"value":"Journal of Computer Languages","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cola.2023.101243","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"101243"}}