{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:57:24Z","timestamp":1761663444515,"version":"3.41.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/etfa.2015.7301644","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T22:21:19Z","timestamp":1445898079000},"page":"1-4","source":"Crossref","is-referenced-by-count":23,"title":["Security-aware functional modeling of Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Jiang","family":"Wan","sequence":"first","affiliation":[]},{"given":"Arquimedes","family":"Canedo","sequence":"additional","affiliation":[]},{"given":"Mohammad Abdullah","family":"Al Faruque","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228402"},{"key":"ref11","first-page":"294","article-title":"Attacks, applications and evaluation of known watermarking algorithms with checkmark","volume":"4675","author":"meerwald","year":"2001","journal-title":"Proc SPIE"},{"key":"ref12","article-title":"Attack modeling for information security and survivability","author":"moore","year":"2001","journal-title":"Technical report DTIC Document"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref18","article-title":"Functional Model-based Design Methodology for Automotive Cyber-Physical Systems","author":"wan","year":"2014","journal-title":"IEEE Syst J (ISJ)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593095"},{"key":"ref4","article-title":"Functional Modeling Compiler for System-Level Design of Automotive Cyber-Physical Systerns","author":"canedo","year":"2014","journal-title":"Proceedings of the ACM\/IEEE International Conference on Computer-Aided Design (ICCAD)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2502524.2502539"},{"key":"ref6","article-title":"Building operations efficiencies into nasas ares i crew launch vehicle design","author":"dumbacher","year":"2007","journal-title":"54th Joint JANNAF Propulsion Conference"},{"key":"ref5","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1145\/996566.996771","article-title":"Security as a new dimension in embedded system design","author":"kocher","year":"2004","journal-title":"Proceedings of the 41st Annual Design Automation Conference"},{"key":"ref7","article-title":"Model based systems engineering using validated executable specifications as an enabler for cost and risk reduction","author":"fortney","year":"2014","journal-title":"Proceedings of the 2014 Ground Vehicle Systems Engineering and Technology Symposium (GVSETS)"},{"key":"ref2","first-page":"315","article-title":"Multidisciplinary integrated design automation tool for automotive cyber-physical systems","author":"canedo","year":"2014","journal-title":"Proc Design Automation & Test Europe Conf"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177101"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2012.6309293"}],"event":{"name":"2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA)","start":{"date-parts":[[2015,9,8]]},"location":"Luxembourg, Luxembourg","end":{"date-parts":[[2015,9,11]]}},"container-title":["2015 IEEE 20th Conference on Emerging Technologies &amp; Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7295717\/7301399\/07301644.pdf?arnumber=7301644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:39:50Z","timestamp":1748666390000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7301644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/etfa.2015.7301644","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}