{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:27:12Z","timestamp":1772677632420,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,3]]},"DOI":"10.1109\/codit58514.2023.10284094","type":"proceedings-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T13:46:12Z","timestamp":1698155172000},"page":"1267-1272","source":"Crossref","is-referenced-by-count":3,"title":["Towards an Ontology-Based Fault Detection and Diagnosis Framework - A Semantic Approach"],"prefix":"10.1109","author":[{"given":"L\u00e1szl\u00f3","family":"Nagy","sequence":"first","affiliation":[{"name":"ELKH-PE Complex Systems,Monitoring Research Group,Veszpr&#x00E9;m,Hungary"}]},{"given":"Tam\u00e1s","family":"Ruppert","sequence":"additional","affiliation":[{"name":"ELKH-PE Complex Systems,Monitoring Research Group,Veszpr&#x00E9;m,Hungary"}]},{"given":"J\u00e1nos","family":"Abonyi","sequence":"additional","affiliation":[{"name":"ELKH-PE Complex Systems,Monitoring Research Group,Veszpr&#x00E9;m,Hungary"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.58"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2015.03.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3307363.3307381"},{"key":"ref14","author":"stamatis","year":"2003","journal-title":"Failure Mode and Effect Analysis FMEA from Theory to Execution"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.107026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.21710\/rch.v22i0.442"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.01.058"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1115\/1.4051940"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/JAMR-02-2017-0024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112948"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app11115110"},{"key":"ref19","article-title":"A survey on ontology reasoners and comparison","volume":"57","author":"abburu","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref18","first-page":"1","article-title":"Reasoning over sparql","author":"coppens","year":"2013","journal-title":"LDOW"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-014-0107-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3233\/SW-200406"},{"key":"ref26","first-page":"17","volume":"2213","author":"steenwinckel","year":"0","journal-title":"Towards adaptive anomaly detection and root cause analysis by automated extraction of knowledge from risk analyses"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/computers7040068"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CP.1943-5487.0000125"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2016.06.047"},{"key":"ref21","first-page":"47","author":"mokos","year":"0","journal-title":"Ontology-based model driven engineering for safety verification"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2020.103300"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2018.06.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s18072346"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100257"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2009.08.076"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/su11164371"},{"key":"ref5","article-title":"Survey on models and techniques for root-cause analysis","author":"sol\u00e9","year":"2017","journal-title":"ArXiv Preprint"}],"event":{"name":"2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)","location":"Rome, Italy","start":{"date-parts":[[2023,7,3]]},"end":{"date-parts":[[2023,7,6]]}},"container-title":["2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10284032\/10284045\/10284094.pdf?arnumber=10284094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T14:01:32Z","timestamp":1699884092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10284094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,3]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/codit58514.2023.10284094","relation":{},"subject":[],"published":{"date-parts":[[2023,7,3]]}}}