{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:17Z","timestamp":1730248637940,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/icit.2019.8754962","type":"proceedings-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T22:14:55Z","timestamp":1562278495000},"page":"1379-1384","source":"Crossref","is-referenced-by-count":4,"title":["A Perspective on Ensuring Predictability in Time-critical and Secure Cooperative Cyber Physical Systems"],"prefix":"10.1109","author":[{"given":"Saad","family":"Mubeen","sequence":"first","affiliation":[]},{"given":"Elena","family":"Lisova","sequence":"additional","affiliation":[]},{"given":"Aneta Vulgarakis","family":"Feljan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Agent-centred approach for assuring ethics in dependable service systems","author":"\u0161ljivo","year":"2017","journal-title":"13th IEEE World Congress on Services"},{"key":"ref38","article-title":"A pragmatic approach to reasoning about the assurance of safety arguments","author":"weaver","year":"2003","journal-title":"8th Australian Workshop on Safety Critical Systems and Software"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2017.8217474"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00096-X"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.08.004"},{"journal-title":"Arguing Security - Creating Security Assurance Cases","year":"2014","author":"weinstock","key":"ref30"},{"journal-title":"Engineering for System Assurance in NATO Programmes","year":"2010","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.033"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3384\/lic.diva-134427"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88479-8_26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2435227.2435262"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECOMPANION.2007.30"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7298"},{"journal-title":"How Volvo CE is engineering a quarry run by electric loaders and haulers for big cuts to costs and emissions","year":"2016","author":"doyle","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000045315.61234.1e"},{"journal-title":"Timing Augmented Description Language (TADL2) syntax semantics metamodel Ver 2 Deliverable","year":"2012","key":"ref16"},{"year":"0","key":"ref17","article-title":"EAST-ADL Domain Model Specification, V2.1.12"},{"key":"ref18","article-title":"Supporting timing analysis of vehicular embedded systems through the refinement of timing constraints","author":"mubeen","year":"2017","journal-title":"Software & Systems Modeling"},{"year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFTECH.2008.4621600"},{"journal-title":"Embedded Systems Glossary","year":"0","author":"barr","key":"ref4"},{"key":"ref27","first-page":"372","article-title":"Real-time specification patterns","author":"konrad","year":"2005","journal-title":"Proceedings of the 27th International Conference on Software Engineering ser ICSE &#x2019;05"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781482280821"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01995673"},{"journal-title":"ISO\/WD 26262-1 Road vehicles - Functional Safety","year":"2011","key":"ref29"},{"journal-title":"Programming Embedded Systems","year":"2006","author":"barr","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16256-5_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000045316.66276.6e"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref9","first-page":"22","article-title":"A Template for Predictability Definitions with Supporting Evidence","volume":"18","author":"grund","year":"2011","journal-title":"Bringing Theory to Practice Predictability and Performance in Embedded Systems"},{"journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach","year":"2016","author":"lee","key":"ref1"},{"key":"ref20","article-title":"A Compositional Framework for End-to-End Path Delay Calculation of Automotive Systems under Different Path Semantics","author":"feiertag","year":"2008","journal-title":"Workshop CRTS"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FormSERA.2012.6229789"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2016.01.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS120614011M"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31072-0_24"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2015.7298346"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682499"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.68"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2007.358010"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICRSE.2015.7366481"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365734"}],"event":{"name":"2019 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2019,2,13]]},"location":"Melbourne, Australia","end":{"date-parts":[[2019,2,15]]}},"container-title":["2019 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8746085\/8754907\/08754962.pdf?arnumber=8754962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:14:01Z","timestamp":1657854841000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8754962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icit.2019.8754962","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}