{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:48:33Z","timestamp":1761130113431,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,12]]},"DOI":"10.1109\/etfa54631.2023.10275690","type":"proceedings-article","created":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T17:38:14Z","timestamp":1697132294000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Formal Verification of Safety and Security Properties in Industry 4.0 Applications"],"prefix":"10.1109","author":[{"given":"Ali M.","family":"Hosseini","sequence":"first","affiliation":[{"name":"TU Wien,Institute of Computer Technology,Vienna,Austria"}]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[{"name":"TU Wien,Institute of Computer Technology,Vienna,Austria"}]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"TU Wien,Institute of Computer Technology,Vienna,Austria"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927773"},{"year":"0","key":"ref35","article-title":"Recommendations for security and safety co-engineering (release no 3) - part b"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0006140600780089"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04870-8_64"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS57264.2023.10144233"},{"journal-title":"Tech Rep","article-title":"The transport layer security (tls) protocol version 1.2","year":"2008","key":"ref37"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84629-9_1"},{"key":"ref36","article-title":"Safe and secure model-driven design for embedded systems","author":"li","year":"2018","journal-title":"Ph D dissertation Universit&#x00E9; Paris Saclay"},{"key":"ref31","article-title":"Scade 6 a model based solution for safety critical software development","author":"dormoy","year":"2008","journal-title":"Embedded Real Time Software and Systems (ERTS2008)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.38"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093061"},{"year":"0","key":"ref33","article-title":"What is ttool?"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2011.5957992"},{"key":"ref32","article-title":"Papyrusrt: modelling and code generation","author":"posse","year":"2015","journal-title":"Workshop on Open Source for Model Driven Engineering (OSS4MDE'15)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48683-6_3"},{"journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach","year":"2016","author":"lee","key":"ref1"},{"key":"ref17","article-title":"Assisting the design of secured applications for embedded systems","author":"pedroza","year":"2013","journal-title":"Ph D dissertation T&#x00E9;l&#x00E9;com ParisTech"},{"key":"ref16","first-page":"161","article-title":"Understanding, formal verification, and the philosophy of mathematics","volume":"27","author":"avigad","year":"2010","journal-title":"Journal of Indian Council of Philosophical Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS46889.2021.9483606"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3534967"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21236\/ADA455842"},{"journal-title":"Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE Developing Cyber-Physical Systems","year":"2013","author":"selic","key":"ref23"},{"key":"ref26","first-page":"655","article-title":"Sysml-sec: A model driven approach for designing safe and secure systems","author":"roudier","year":"2015","journal-title":"MODELSWARD 2015 3rd Int Conf on Model-Driven Engineering and Software Development"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238326"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44878-7_3"},{"key":"ref22","first-page":"181","article-title":"East-adl&#x2014;an architecture","volume":"176","author":"debruynel","year":"2005","journal-title":"Architecture Description Languages IFIP TC-2 Workshop on Architecture Description Languages (WADL) World Computer Congress Aug 22-27 2004 Toulouse France"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22975-1_11"},{"year":"0","key":"ref28","article-title":"Telecom-Paris. What is sysml-sec?"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/URSI-AT-RASC.2015.7303086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16722-6_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3372020.3391563"},{"key":"ref4","first-page":"5","article-title":"Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial","author":"blanchet","year":"2018","journal-title":"Version from"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30080-9_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.1995.521845"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS53837.2022.9779188"}],"event":{"name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2023,9,12]]},"location":"Sinaia, Romania","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275065\/10275329\/10275690.pdf?arnumber=10275690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:43:45Z","timestamp":1698691425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275690\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/etfa54631.2023.10275690","relation":{},"subject":[],"published":{"date-parts":[[2023,9,12]]}}}