{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:48:59Z","timestamp":1761965339482,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,7]]},"DOI":"10.1109\/etfa45728.2021.9613313","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T19:13:36Z","timestamp":1638299616000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["An Approach for Context-Sensitive Situational Risk Evaluation of Autonomous Systems"],"prefix":"10.1109","author":[{"given":"Manuel","family":"Muller","sequence":"first","affiliation":[]},{"given":"Nasser","family":"Jazdi","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Weyrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2006.1638022"},{"key":"ref11","first-page":"1","article-title":"A Reference Architecture and Roadmap for Models@run.time Systems","author":"a\u00dfmann","year":"2014","journal-title":"LNCS sublibrary SL 2 - Programming and software engineering vol 8378 Models run time Foundations applications and roadmaps \/ Nelly Bencomo [and three others] (eds )"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381825"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9212051"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1515\/auto-2019-0039","article-title":"An architecture of an Intelligent Digital Twin in a Cyber-Physical Production System","volume":"67","author":"talkhestani","year":"2019","journal-title":"at - Automatisierungstechnik"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2019.02.073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2019.00015"},{"key":"ref17","first-page":"1546","article-title":"Safety unit-based safe behavior assurance for autonomous and semi-autonomous aerial systems: Requirements, concept, and simulation results","author":"h\u00e4gclc","year":"0","journal-title":"2017 IEEE Intelligent Vehicles Symposium"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/IJRAT.2015010102"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-017-1049-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/027836499801700402"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795594"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2019.00019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795646"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569384"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.06.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917425"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1515\/auto-2020-0131"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3199852"},{"journal-title":"Concrete problems in ai safety","year":"2016","author":"amodei","key":"ref22"},{"journal-title":"A survey of safety and trustworthiness of deep neural networks Verification testing adversarial attack and defence and interpretability","year":"2018","author":"huang","key":"ref21"},{"key":"ref24","article-title":"Adaptive Models for Safe Maintenance Planning of Cyber-physical Systems","volume":"81","author":"m\u00fcller","year":"0","journal-title":"Procedia CIRP"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37599-7_38"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-540-45058-0_4","article-title":"A Comparative Study of Probabilistic Roadmap Planners","volume":"7","author":"geraerts","year":"2004","journal-title":"Springer Tracts in Advanced Robotics"},{"journal-title":"Emergent Tool Use From Multi-Agent Autocurricula","year":"2019","author":"baker","key":"ref25"}],"event":{"name":"2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2021,9,7]]},"location":"Vasteras, Sweden","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9613137\/9613141\/09613313.pdf?arnumber=9613313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:52:35Z","timestamp":1652187155000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9613313\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/etfa45728.2021.9613313","relation":{},"subject":[],"published":{"date-parts":[[2021,9,7]]}}}