{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:16:14Z","timestamp":1730283374880,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859723","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1047-1051","source":"Crossref","is-referenced-by-count":0,"title":["Methods and software for estimation of information system dependability"],"prefix":"10.1109","author":[{"given":"Nikola","family":"Samec","sequence":"first","affiliation":[]},{"given":"Alen","family":"Jakupovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2009","author":"kaa?niche","journal-title":"Dependability and Security Evaluation of Computer-based Systems","key":"19"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/978-1-4757-4828-4_12"},{"year":"0","key":"18"},{"year":"1995","author":"laprie","journal-title":"Dependability Basic Concepts and Terminology","key":"15"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1007\/978-3-540-68947-8_19"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1007\/978-3-540-68947-8_9"},{"key":"14","first-page":"165","article-title":"Utjecaj oslonjivosti informacijskog sustava na poslovne organizacije","volume":"1","author":"jakupovic?","year":"2013","journal-title":"Zbornik Veleuc?ilis?ta U Rijeci"},{"year":"0","key":"11"},{"year":"2000","journal-title":"Functional Safety of Electric\/electronic\/programmable Electronic Safety-related Systems Parts 0-7","key":"12"},{"year":"2006","author":"isermann","journal-title":"Fault-Diagnosis Systems An Introduction from Fault Detection to Fault Tolerance","key":"21"},{"year":"1999","journal-title":"NASA Failure Modes Effects and Criticality Analysis (FMECA)","key":"20"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/1530873.1530876"},{"year":"0","key":"23"},{"year":"0","key":"24"},{"key":"25","first-page":"3","article-title":"Attack tree-based threat risk analysis","author":"ingoldsby","year":"2010","journal-title":"Amenaza Technologies Limited"},{"year":"1949","journal-title":"Procedures for Performing A Failure Mode Effects and Criticality Analysis MIL-P-1629","key":"26"},{"key":"27","article-title":"Overview of UltraSAN, in computer performance and dependability symposium, 1996","author":"obal","year":"1996","journal-title":"Proceedings of IEEE International"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1007\/978-3-7091-9123-1_10"},{"key":"29","first-page":"327","article-title":"UltraSAN Ver3: Architecture, features, and implementation","author":"sanders","year":"1995","journal-title":"Proceedings of the AIAA Computing in Aerospace 10 Conference"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.jsis.2009.04.001"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1007\/978-1-4020-8157-6_13"},{"key":"10","first-page":"8","author":"tro?ger","year":"2013","journal-title":"Dependable Systems State-Based Dependability Modeling Dependable System Course"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1007\/978-0-85729-318-3"},{"key":"30","first-page":"208","article-title":"STRATUS computer system","author":"wilson","year":"1985","journal-title":"Resilient Computing Systems"},{"key":"7","first-page":"3","article-title":"The role of structure: A dependability perspective","author":"jones","year":"2005","journal-title":"Strture for Dependability Computer-Based Systems from An Interdisciplinary Perspective"},{"key":"6","first-page":"21","author":"schneier","year":"1999","journal-title":"Attack Trees Modelling Security Threats Dr Dobbs Journal"},{"key":"5","first-page":"7","article-title":"Fundamental concepts of dependability","author":"avizienis","year":"2000","journal-title":"Proc of 3rd Information Survivability Workshop"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TDSC.2004.2"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/TDSC.2004.11"},{"year":"1999","author":"ericson","journal-title":"Fault Tree Analysis-A History from the Proceedings of the 17th International System Safety Conference","key":"8"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859723.pdf?arnumber=6859723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:25:31Z","timestamp":1490293531000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859723","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}