{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:51:51Z","timestamp":1729612311044,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5641966","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:35:53Z","timestamp":1291152953000},"page":"467-473","source":"Crossref","is-referenced-by-count":1,"title":["Fault tree analysis of a fire hazard of a power distribution cabinet with Petri Nets"],"prefix":"10.1109","author":[{"given":"Alper","family":"Pahsa","sequence":"first","affiliation":[]},{"given":"T. Arinc","family":"Bayazit","sequence":"additional","affiliation":[]},{"given":"Gokcen","family":"Alat","sequence":"additional","affiliation":[]},{"given":"Buyurman","family":"Baykal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Military Handbook System Safety Engineering Design Guide for Army Material MIL-HDBK-764","year":"1990","key":"ref4"},{"key":"ref3","article-title":"Fault Analysis Using Petri Nets","author":"sacha","year":"2001","journal-title":"Proceedings of the 2nd IEEE SMC Information Assurance Workshop"},{"key":"ref10","first-page":"6d","author":"hixenbaugh","year":"1968","journal-title":"Fault Tree for Safety"},{"journal-title":"Health&Safety Briefing","article-title":"Quantified Risk Assessment Techniques-Part 3 Fault Tree Analysis-FTA","year":"2009","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1988.194747"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/3-540-48249-0_31","article-title":"Modeling Safety-Critical Systems with Z and Petri Nets","author":"heiner","year":"1999","journal-title":"18th Int Conf on Comp Safety Reliability and Security"},{"key":"ref12","article-title":"Diagnosis of Discrete Event Systems using Labeled Petri Nets","author":"cabasino","year":"2009","journal-title":"2nd IFAC Workshop on Dependable Control of Discrete Systems"},{"key":"ref8","volume":"77","author":"murata","year":"1989","journal-title":"Petri Nets Properties Analysis and Applications"},{"key":"ref7","article-title":"Fault Tree Analysis - A History","author":"ericson","year":"1999","journal-title":"Proc 17th Int System Safety Conf"},{"key":"ref2","article-title":"Safety Analysis Using Petri Nets","volume":"se 13","author":"leveson","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref9","article-title":"Petri Net Analysis Using Boolean Manipulation","author":"badia","year":"1994","journal-title":"15th International Conference on Application and Theory of Petri Nets"},{"key":"ref1","article-title":"Combining Fault Trees and Petri Nets to Model Safety-Critical Systems","author":"buchacker","year":"1999","journal-title":"Society for Computer Simulation"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05641966.pdf?arnumber=5641966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:42:44Z","timestamp":1497890564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5641966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5641966","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}