{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:10:59Z","timestamp":1740132659288,"version":"3.37.3"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/mc.2023.3326947","type":"journal-article","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T18:43:03Z","timestamp":1712083383000},"page":"57-67","source":"Crossref","is-referenced-by-count":1,"title":["Dependability Improvement Depends on Dependable Measurement"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2226-3453","authenticated-orcid":false,"given":"Les","family":"Hatton","sequence":"first","affiliation":[{"name":"Kingston University, London, U.K."}]}],"member":"263","reference":[{"key":"ref1-sidebar1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1928.tb01236.x"},{"key":"ref2-sidebar1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"volume-title":"Information theory and the length distribution of all discrete systems","year":"2017","author":"Hatton","key":"ref3-sidebar1"},{"volume-title":"Psycho-Biology of Languages: An Introduction to Dynamic Philology","year":"1935","author":"Zipf","key":"ref4-sidebar1"},{"key":"ref5-sidebar1","doi-asserted-by":"publisher","DOI":"10.1145\/1391984.1391986"},{"volume-title":"Exposing Natures Bias: The Hidden Clockwork behind Society, Life and the Universe","year":"2022","author":"Hatton","key":"ref6-sidebar1"},{"volume-title":"The SwissProt release","year":"2017","key":"ref7-sidebar1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/proc.1986.13527"},{"volume-title":"Developing Software in High-Integrity and Safety-Critical Systems","year":"1995","author":"Hatton","key":"ref2"},{"volume-title":"Dependable Computing Systems: Paradigms, Performance Issues, and Applications","year":"2005","author":"Diab","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b11667"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0671-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02063-6_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2009.56"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.2989808"},{"volume-title":"How Safe Is Safe Enough? Measuring and Predicting Autonomous Vehicle Safety","year":"2022","author":"Koopman","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/issrew.2016.47"},{"volume-title":"To Engineer is Human: The Role of Failure in Successful Design","year":"1992","author":"Petroski","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt7srgf"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23943\/9781400889686"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/390016.808439"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/9781119202486"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/52.199724"},{"volume-title":"Software Testing Techniques","year":"1990","author":"Beizer","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2017.3571582"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359369.359392"},{"volume-title":"An Independent Review into the Broader Issues Surrounding the Loss of the RAF Nimrod MR2 Aircraft XV230 in Afghanistan in 2006","year":"2009","author":"Haddon-Cave","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/2.566148"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1847"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/2.675631"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1976.233837"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/32.815326"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2010.19"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.191101"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/69605.2085"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90040-s"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/s0164-1212(98)10050-x"},{"volume-title":"Software Metrics: A Rigorous and Practical Approach","year":"1997","author":"Fenton","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/2.962984"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2003.1191795"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/promise.2007.9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/promise.2007.10"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9080-x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2016.2521368"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2017.2659747"},{"article-title":"Defect patterns and software metric correlations in a mature ubiquitous system","year":"2019","author":"Hopkins","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2005.49"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1147\/rd.281.0002"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/163359.163373"},{"key":"ref44","first-page":"831","article-title":"Software reliability: Basic concepts and assessment methods","volume-title":"Proc. Int. Conf. Softw. Eng.","author":"Littlewood","year":"2000"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1986.6312924"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/52.636672"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3182\/20120912-3-bg-2031.00036"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1038\/nature10836"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad067"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/10488870\/10488899.pdf?arnumber=10488899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T17:40:20Z","timestamp":1712166020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10488899\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":56,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mc.2023.3326947","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}