{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T14:35:03Z","timestamp":1764858903894,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ieem.2015.7385799","type":"proceedings-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T09:44:45Z","timestamp":1462614285000},"page":"1001-1006","source":"Crossref","is-referenced-by-count":10,"title":["Strategy for reliability testing and evaluation of cyber physical systems"],"prefix":"10.1109","author":[{"given":"Z.","family":"Li","sequence":"first","affiliation":[]},{"given":"R.","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Robustness of networks with topologies of dependency links","author":"lin","year":"2014","journal-title":"e arXiv 1412 2190"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160000"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.18"},{"key":"ref12","first-page":"906","article-title":"Moving toward probabilistic reliability assessment methods","author":"pei zhang","year":"2004","journal-title":"2004 International Conference on Probabilistic Methods Applied to Power Systems PMAPS"},{"key":"ref13","article-title":"A Roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems","author":"chittester","year":"0","journal-title":"Journal of Homeland Security and Emergency Management 2005"},{"key":"ref14","first-page":"25","article-title":"Survey on the research of cyber-physical systems(CPS)","volume":"38","author":"zuopeng","year":"2011","journal-title":"Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2015.7105067"},{"key":"ref16","first-page":"272","article-title":"Selection and analysis of test scheme parameters for time curtailed reliability qualification test","volume":"27","author":"gencheng","year":"2006","journal-title":"Acta Aeronautica et Astronautica Sinica"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1980.5220742"},{"key":"ref18","article-title":"Accelarated life tests","author":"shisong","year":"2000","journal-title":"Science Press"},{"key":"ref19","first-page":"3018","article-title":"Dynamic generation of safety test case based on minimal cut sets","volume":"27","author":"zhi","year":"2006","journal-title":"Computer Engineering and Design"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/srep05381"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29860-8_35"},{"key":"ref27","first-page":"469","article-title":"Reliability modelling and simulation of complex systems","author":"lin","year":"2013"},{"key":"ref3","first-page":"552","article-title":"Modeling and verification of interactive behavior for cyber-physical systems","author":"jia","year":"2011","journal-title":"Software Engineering and Service Science (ICSESS) 2011 IEEE 2nd International Conference on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2009.5410453"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2013.102"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385876"},{"key":"ref7","first-page":"32","article-title":"Research and design for the modeling of simulation of CPS","volume":"39","author":"xia","year":"2012","journal-title":"Computer Science"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/S1383-7621(03)00096-1","article-title":"Modeling and formal verification of embedded systems based on a Petri net representation","volume":"49","author":"cortes","year":"2003","journal-title":"Journal of Systems Architecture"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2396994"},{"article-title":"Cyber physical system","year":"2011","author":"lee","key":"ref1"},{"key":"ref20","first-page":"532","article-title":"Safety testing for LHC access system","author":"valentini","year":"2008"},{"key":"ref22","first-page":"1046","article-title":"Self-description and regeneration of test cases based on errorguessing method for safety-critical software automatic testing","volume":"32","author":"meng","year":"2004","journal-title":"JOURNAL OF TONGJI UNIVERSITY(NATU RAL SCIENCE)"},{"key":"ref21","first-page":"55","article-title":"Formal method and test technology and applying them to security equipments","volume":"22","author":"huaijian","year":"2006","journal-title":"Microcomputer Information[J]"},{"key":"ref24","first-page":"405","article-title":"Analysis of fault location in software compatibility testing","author":"yong","year":"2013","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref23","first-page":"56","article-title":"Research on software security testing methods","author":"yinsheng","year":"2008","journal-title":"Microcomputer Information"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/2.585157"},{"key":"ref25","first-page":"295","article-title":"Cyber-physical system architecture design","author":"lina","year":"2011","journal-title":"Computer Science"}],"event":{"name":"2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","start":{"date-parts":[[2015,12,6]]},"location":"Singapore, Singapore","end":{"date-parts":[[2015,12,9]]}},"container-title":["2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7378213\/7385591\/07385799.pdf?arnumber=7385799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:02:11Z","timestamp":1498309331000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7385799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ieem.2015.7385799","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}