{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:57:30Z","timestamp":1760551050360,"version":"3.41.2"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/isse46696.2019.8984569","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T01:28:37Z","timestamp":1581038917000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A Rigorous System Engineering Process for Resilient Cyber-Physical Systems Design"],"prefix":"10.1109","author":[{"given":"Thomas Allen","family":"McDermott","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology,Systems Engineering Research Center,Hoboken,New Jersey,USA"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Human capital development &#x2013; resilient cyber physical systems","author":"mcdermott","year":"2017","journal-title":"Systems Engineering Research Center (SERC) Technical Report SERC-2017-TR-075"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301644"},{"key":"ref12","first-page":"988","author":"rashid","year":"2017","journal-title":"Automation Science and Engineering (CASE) IEEE Conference on"},{"journal-title":"Engineering A Safer World Systems Thinking Applied to Safety","year":"2013","author":"leveson","key":"ref13"},{"key":"ref14","article-title":"Model-based engineering for functional risk assessment and design of cyber resilient systems","author":"beling","year":"2019","journal-title":"Technical Report SERC-2019-TR-002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2530277"},{"journal-title":"Model-Based Engineering with AADL An Introduction to the SAE Architecture Analysis & Design Language","year":"2012","author":"feiler","key":"ref16"},{"key":"ref17","first-page":"19","article-title":"Resolute: an assurance case language for architecture models","year":"2014","journal-title":"HILT"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21236\/ADA626823"},{"key":"ref19","article-title":"Security engineering &#x2013; FY17 systems aware cybersecurity","author":"horowitz","year":"2017","journal-title":"Technical Report SERC-2017-TR-114"},{"journal-title":"Defense Advanced Research Projects Agency High Assurance Cyber Military Systems (HACMS)","year":"0","key":"ref4"},{"journal-title":"Security Engineering &#x2013; Design Patterns and Operational Concepts","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13050-3_6"},{"key":"ref8","article-title":"Software Assurance Competency Model. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania","author":"hilburn","year":"2013","journal-title":"Technical Note CMU\/SEI-2013-TN-004"},{"journal-title":"North Atlantic Treaty Organization (NATO) Engineering for system assurance in NATO programs","year":"2010","key":"ref7"},{"journal-title":"Handbook of System Safety and Security Cyber Risk and Risk Management Cyber Security Adversary Modeling Threat Analysis Business of Safety Functional Safety Software Systems and Cyber Physical Systems","year":"2016","author":"griffor e","key":"ref2"},{"journal-title":"National Institute for Standards and Technology (NIST) Framework for Cyber-Physical Systems Release 1 0","year":"2016","key":"ref1"},{"journal-title":"Building secure resilient architectures for cyber mission assurance","year":"2010","author":"goldman","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0401"},{"year":"0","key":"ref22"},{"key":"ref21","first-page":"14","volume":"51","author":"cofer","year":"2018","journal-title":"A Formal Approach to Constructing Secure Air Vehicle Software"},{"key":"ref23","article-title":"Secure mathematically-assured composition of control models","author":"cofer","year":"2017","journal-title":"AFRL-RI-RS-TR-2017-176 Rockwell Collins Final Technical Report"}],"event":{"name":"2019 International Symposium on Systems Engineering (ISSE)","start":{"date-parts":[[2019,10,1]]},"location":"Edinburgh, UK","end":{"date-parts":[[2019,10,3]]}},"container-title":["2019 International Symposium on Systems Engineering (ISSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966755\/8984263\/08984569.pdf?arnumber=8984569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:41:30Z","timestamp":1753731690000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8984569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isse46696.2019.8984569","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}