{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:58:04Z","timestamp":1768586284309,"version":"3.49.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Key Research and Development Project","award":["2017YFE0125300"],"award-info":[{"award-number":["2017YFE0125300"]}]},{"name":"Science and Technology Program of Liaoning Province","award":["2019JH2\/10100019"],"award-info":[{"award-number":["2019JH2\/10100019"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2967453","type":"journal-article","created":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T21:06:26Z","timestamp":1579295186000},"page":"15241-15255","source":"Crossref","is-referenced-by-count":18,"title":["Integrated Functional Safety and Security Diagnosis Mechanism of CPS Based on Blockchain"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7642-9581","authenticated-orcid":false,"given":"Ai","family":"Gu","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Yin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6052-8128","authenticated-orcid":false,"given":"Chuanyu","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.12.004"},{"key":"ref38","first-page":"8","article-title":"Design of safety instrumented function loop & SIL certification","volume":"53","author":"gao","year":"2017","journal-title":"Automat in Petro-Chemical Industry"},{"key":"ref33","first-page":"39","article-title":"Establishment of extended model for determining and evaluating ASIL in the ISO 26262 automotive functional safety system","volume":"22","author":"choi","year":"2017","journal-title":"Journal Korean Institute of Plant Engineering"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.04.033"},{"key":"ref31","year":"2015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00313-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200016"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/978-3-319-10506-2_21","article-title":"Security application of failure mode and effect analysis (FMEA)","author":"schmittner","year":"2014","journal-title":"Computer Safety Reliability and Security"},{"key":"ref34","first-page":"14","article-title":"Security assessments of safety critical systems using HAZOPs","author":"winther","year":"2001","journal-title":"Computer Safety Reliability and Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5217"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.procs.2016.09.290","article-title":"Topology-based safety analysis for safety critical CPS","volume":"95","author":"choley","year":"2016","journal-title":"Procedia Comput Sci"},{"key":"ref12","article-title":"Security solutions for cyber-physical systems","author":"venkatasubramanian","year":"2009","journal-title":"User-Driven Healthcare Concepts Methodologies Tools and Applications"},{"key":"ref13","article-title":"Cyber physical security solutions for pervasive health monitoring systems","author":"venkatasubramanian","year":"2012","journal-title":"User-Driven Healthcare Concepts Methodologies Tools and Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app9050848"},{"key":"ref15","year":"0"},{"key":"ref16","year":"2010","journal-title":"Standard CNSS Instruction 4009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2889866"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2919066"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13382"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856807"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854794"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/sym9090193"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s40684-016-0015-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844794"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2657006"},{"key":"ref8","first-page":"161","article-title":"Cyber-Physical Systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2590778"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929205"},{"key":"ref22","first-page":"30","article-title":"Study on the safe-sec safety communication approach for control system","volume":"34","author":"song","year":"2013","journal-title":"Process Autom Instrum"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1016\/j.ifacol.2018.09.572","article-title":"Integrated functional safety and cyber security analysis","volume":"51","author":"?liwi?ski","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978400"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2016.07.013"},{"key":"ref41","article-title":"Blockchain based large data security identity authenticating method, involves accessing private key by data node, and blocking big data node from accessing asset network when public key in digital fingerprint not matches private key","author":"yin","year":"2019"},{"key":"ref23","first-page":"1941","article-title":"Development of industrial Ethernet security protocol stack based on cortex-A8","volume":"34","author":"wan","year":"2013","journal-title":"Eng Comput"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.732-733.1283"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08961967.pdf?arnumber=8961967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T19:31:39Z","timestamp":1643311899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8961967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2967453","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}