{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:58:16Z","timestamp":1730267896234,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8471937","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"733-740","source":"Crossref","is-referenced-by-count":3,"title":["Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design"],"prefix":"10.1109","author":[{"given":"Bryan M.","family":"OrHalloran","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Papakonstantinou","sequence":"additional","affiliation":[]},{"given":"Douglas L.","family":"Van Bossuyt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"ref10","first-page":"397","article-title":"The function-failure design method","volume":"127","author":"robert","year":"2004","journal-title":"Mechanical Design"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2011-63110"},{"key":"ref12","article-title":"Ffip: A framework for early assessment of functional failures in complex systems","volume":"7","author":"kurtoglu","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1115\/1.2885181"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00163-013-0156-2"},{"key":"ref15","first-page":"1","article-title":"Modeling of function failure propagation across uncoupled systems","author":"o\u2019halloran","year":"2015","journal-title":"2015 Ann Reliability and Maintainability Symp (RAMS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897799"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.065102"},{"year":"2011","key":"ref4","article-title":"What went wrong in fukushima: The human factor"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1126\/science.3563507"},{"year":"1987","key":"ref3","article-title":"Report on the accident at the chernobyl nuclear power station (nureg-1250)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"year":"2016","key":"ref29","article-title":"Apros references from nuclear industry"},{"key":"ref8","article-title":"Weapon system requirements: Detailed systems engineering prior to product development positions programs for success (gao-17-77)","author":"sullivan","year":"2017","journal-title":"U S Government Accountability Office"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/381766.381770"},{"year":"2014","key":"ref2","article-title":"Backgrounder on the three mile island accident"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/0096340211426395"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1115\/1.1289637"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.77.026102"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634438"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref24","volume":"199","author":"rumbaugh","year":"1991","journal-title":"Object-Oriented Modeling and Design"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1966913.1966959","article-title":"Attacks against process control systems: risk assessment, detection, and response","author":"c\u00e1rdenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ACM"},{"key":"ref26","article-title":"Survey of model-based systems engineering (mbse) methodologies","volume":"25","author":"estefan","year":"2007","journal-title":"INCOSE MBSE Focus Group"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005094"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08471937.pdf?arnumber=8471937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T01:51:35Z","timestamp":1640224295000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8471937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8471937","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}