{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:29:25Z","timestamp":1730291365559,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/qrs57517.2022.00040","type":"proceedings-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T13:37:55Z","timestamp":1679319475000},"page":"311-320","source":"Crossref","is-referenced-by-count":1,"title":["An Ontological Analysis of Safety-Critical Software and Its Anomalies"],"prefix":"10.1109","author":[{"given":"Hezhen","family":"Liu","sequence":"first","affiliation":[{"name":"Huawei Technologies Co., Ltd,Reliability Technology Lab,Shenzhen,China,518129"}]},{"given":"Zhi","family":"Jin","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Peking University),Ministry of Education,Beijing,China,100871"}]},{"given":"Zheng","family":"Zheng","sequence":"additional","affiliation":[{"name":"Beihang University,School of Automation Science and Electrical Engineering,Beijing,China,100191"}]},{"given":"Chengqiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd,Reliability Technology Lab,Shenzhen,China,518129"}]},{"given":"Xun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd,Reliability Technology Lab,Shenzhen,China,518129"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1201\/9781315210469-157"},{"key":"ref35","article-title":"The hazardous situation ontology design pattern","author":"lawrynowicz","year":"2015","journal-title":"WOP"},{"year":"2004","journal-title":"Department of Defense","article-title":"Nasa software safety guidebook: Nasa technical standard","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1201\/b15938-381"},{"key":"ref15","article-title":"Sabio: Systematic approach for building ontologies","volume":"1301","author":"de almeida falbo","year":"0"},{"key":"ref37","first-page":"1","article-title":"Iso\/iec\/ieee international standards - systems and software engineering &#x2013; system life cycle processes","year":"0","journal-title":"ISO\/IEC\/IEEE 15288 2015"},{"key":"ref14","article-title":"On ontology, ontologies, conceptualizations, modeling languages, and (meta)models","author":"guizzardi","year":"2006","journal-title":"DB&IS"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.5220\/0005618003160327"},{"key":"ref31","first-page":"118","article-title":"An ontological analysis of fault process and category of faults","author":"kitamura","year":"1999","journal-title":"Tenth International Workshop on Principles of Diagnosis (DX-99)"},{"key":"ref30","first-page":"117","article-title":"Preliminaries to a formal ontology of failure of engineering artifacts","author":"frate","year":"2012","journal-title":"FOIS"},{"year":"1995","author":"leverson","journal-title":"Safeware System Safety and Computers","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/MARK.2011.6046555"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.datak.2021.101892"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ASPEC.2007.59"},{"year":"2014","author":"bourque","journal-title":"The guide to the Software Engineering Body of Knowledge (SWEBOK(R)) V 3 0","key":"ref2"},{"key":"ref1","first-page":"26","article-title":"Effective approaches for delivering affordable military software","volume":"26","author":"hagen","year":"2013","journal-title":"Real-time Information Assurance"},{"key":"ref17","article-title":"Ontological foundations for structural conceptual models","author":"guizzardi","year":"2005","journal-title":"Ph D Thesis of the University of Twente"},{"year":"0","journal-title":"IEC 61508-1\/7 2010","article-title":"Functional safety of electrical\/electronic\/programmable electronic safety-related systems","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.3233\/AO-180197"},{"key":"ref38","first-page":"1","article-title":"Iso\/iec\/ieee international standard - systems and software engineering &#x2013; life cycle processes &#x2013; requirements engineering","year":"0","journal-title":"ISO\/IEC\/IEEE 29148 2018"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3233\/AO-190214"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-642-41924-9_27"},{"key":"ref24","first-page":"383","author":"oberle","year":"2009","journal-title":"An Ontology for Software"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/ICSRS.2017.8272856"},{"key":"ref23","first-page":"13","article-title":"Problems in the ontology of computer programs","volume":"2","author":"eden","year":"2007","journal-title":"Appl Ontol"},{"key":"ref45","article-title":"Software problem led to system failure at dhahran, saudi arabia","author":"defense","year":"1992","journal-title":"US GAO Reports report no GAO\/IMTEC-92-26"},{"key":"ref26","first-page":"317","article-title":"Towards an ontology of software: a requirements engineering perspective","volume":"267","author":"wang","year":"2014","journal-title":"Formal Ontology in Information Systems"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1163\/9789401209182_005"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1017\/S0890060421000342"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.3233\/AO-210256"},{"year":"2000","author":"lawrence chung","article-title":"Nonfunctional requirements in software engineering","key":"ref42"},{"year":"2021","journal-title":"Guide to the Systems Engineering Body of Knowledge (SEBoK)","key":"ref41"},{"key":"ref22","first-page":"89","article-title":"What is software","volume":"2","author":"suber","year":"1988","journal-title":"J Specul Philos"},{"key":"ref44","first-page":"1","article-title":"Iso\/iec\/ieee international standard - systems and software engineering&#x2013; systems and software assurance &#x2013;part 1:concepts and vocabulary","year":"0","journal-title":"ISO\/IEC\/IEEE 15026-1 2019(E)"},{"year":"2022","author":"contributors","article-title":"Upper ontology &#x2014; Wikipedia, the free encyclopedia","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/TDSC.2004.2"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/237432.237434"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1080\/13869790410001694462"},{"key":"ref29","first-page":"511","article-title":"Using a foundational ontology for reengineering a software process ontology","volume":"2","author":"bringuente","year":"2011","journal-title":"Journal of Information and Data Management"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SEW.2012.26"},{"year":"1996","author":"lyu","journal-title":"Handbook of Software Reliability Engineering","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/32.210303"},{"key":"ref4","first-page":"1","article-title":"Standard classification for software anomalies","year":"2010","journal-title":"IEEE 1044"},{"key":"ref3","article-title":"Cmmi for development, version 1.3","author":"team","year":"2010","journal-title":"Tech Rep CMU\/SEI-2010-TR-033 Software Engineering Institute Carnegie Mellon University Pittsburgh PA"},{"key":"ref6","first-page":"1","article-title":"Systems and software engineering&#x2013;systems and software assurance&#x2013; part 1: Concepts and vocabulary","year":"2014","journal-title":"IEEE 15026"},{"key":"ref5","first-page":"1","article-title":"Iso\/iec\/ieee international standards - systems and software engineering&#x2013; vocabulary","year":"0","journal-title":"ISO\/IEC\/IEEE 24765 2017"},{"year":"0","journal-title":"ISO 26262-1 2018","article-title":"Road vehicles &#x2014; functional safety &#x2014; part 1: Vocabulary","key":"ref40"}],"event":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","start":{"date-parts":[[2022,12,5]]},"location":"Guangzhou, China","end":{"date-parts":[[2022,12,9]]}},"container-title":["2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10061851\/10061812\/10062394.pdf?arnumber=10062394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T14:52:59Z","timestamp":1681138379000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10062394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/qrs57517.2022.00040","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}