{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:25:22Z","timestamp":1730233522516,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icccn.2018.8487464","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T22:24:08Z","timestamp":1539296648000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree"],"prefix":"10.1109","author":[{"given":"Shengwei","family":"Yi","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yangyang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Puhan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liqing","family":"Di","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.ress.2006.03.008"},{"key":"ref3","article-title":"The sesa method for assessing secure remote access to safety instrumented systems","volume":"1626","author":"gr?tan","year":"2007","journal-title":"SINTEF Report A"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TITS.2015.2393752"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1007\/3-540-48249-0_40","article-title":"The integration of safety and security requirements","author":"eames","year":"1999","journal-title":"International Conference on Computer Safety Reliability and Security"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1852666.1852754"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-319-10506-2_16"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/S0951-8320(03)00143-1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TITS.2012.2188288"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2523649.2530277"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TITS.2014.2298038"}],"event":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2018,7,30]]},"location":"Hangzhou","end":{"date-parts":[[2018,8,2]]}},"container-title":["2018 27th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8486798\/8487301\/08487464.pdf?arnumber=8487464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:58:47Z","timestamp":1643219927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8487464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icccn.2018.8487464","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}