{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:11:14Z","timestamp":1774905074025,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T00:00:00Z","timestamp":1296518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1109\/tii.2010.2098415","type":"journal-article","created":{"date-parts":[[2010,12,22]],"date-time":"2010-12-22T00:27:18Z","timestamp":1292977638000},"page":"90-104","source":"Crossref","is-referenced-by-count":56,"title":["Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques"],"prefix":"10.1109","volume":"7","author":[{"given":"Simona","family":"Bernardi","sequence":"first","affiliation":[]},{"given":"Javier","family":"Campos","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Merseguer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-006-0026-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SCESM.2007.1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1071021.1071022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/584369.584376"},{"key":"ref31","first-page":"262","article-title":"derivation of petri net performance models from uml specifications of communications software","author":"king","year":"2000","journal-title":"Proc 15th U K Performance Engineering Workshop Specifications of Communication Software"},{"key":"ref30","article-title":"A dependability profile within MARTE","author":"bernardi","year":"0","journal-title":"J Software and System Modeling"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/11506843_9","article-title":"Compositional semantics for UML 2.0 sequence diagrams using Petri Nets","volume":"3530","author":"eichner","year":"2005","journal-title":"Proc 12th Int SDL Forum SDL 2005 Model Driven"},{"key":"ref36","first-page":"138","article-title":"petri nets as a semantic model for message sequence charts specification","author":"kluge","year":"2002","journal-title":"Proc 2nd Int Workshop on Integration of Specification Techniques for Applications in Engineering (INT02)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ITI.2001.937990"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.02.029"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.12"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-005-0205-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"ref1","author":"lazowska","year":"1984","journal-title":"Quantitative System Performance Computer System Analysis Using Queueing Network Models"},{"key":"ref20","year":"0","journal-title":"BSI Standard 100-1 Information Security Management Systems (ISMS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-007-0013-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-010-0166-8"},{"key":"ref24","year":"0","journal-title":"EBIOS Expression des Besoins et Identification des Objectifs de Scurit"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.21236\/ADA399229","author":"alberts","year":"2001","journal-title":"OCTAVE Criteria"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1237174"},{"key":"ref25","year":"0","journal-title":"CRAMM v5 1 Information Security Toolkit"},{"key":"ref50","author":"mauri","year":"2000","journal-title":"Integrating safety analysis techniques supporting identification of common cause failures"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2017201"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/32.940727"},{"key":"ref12","year":"2001","journal-title":"IEC-60300-3-1 Dependability Management"},{"key":"ref13","year":"1999","journal-title":"MIL-STD-882 System Safety Program Requirements"},{"key":"ref14","author":"leveson","year":"1995","journal-title":"Safeware System Safety and Computers"},{"key":"ref15","author":"stamatelatos","year":"2002","journal-title":"Probabilistic Risk Assessment Procedures Guide for NASA Managers and Practitioners"},{"key":"ref16","author":"rodger","year":"1999","journal-title":"Uncertainty & Risk Analysis"},{"key":"ref17","year":"2008","journal-title":"UML Profile for Modeling Quality of Service and Fault Tolerant Characteristics and Mechanisms"},{"key":"ref18","year":"2008","journal-title":"Information Technology - Security Techniques - Information Security Risk Management"},{"key":"ref19","year":"0","journal-title":"NIST The National Vulnerability Database"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/32.75415"},{"key":"ref3","author":"ajmone marsan","year":"1995","journal-title":"Modelling with Generalized Stochastic Petri Nets"},{"key":"ref6","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093424"},{"key":"ref8","year":"2010","journal-title":"Unified Modeling Language Superstructure"},{"key":"ref7","year":"1999","journal-title":"Australian Standard AZ\/NZS4360 Risk Management"},{"key":"ref49","first-page":"139","article-title":"hierarchically performed hazard origin and propagation studies","volume":"1698","author":"papadopolous","year":"1999","journal-title":"Proc SAFE 99"},{"key":"ref9","year":"2009","journal-title":"A UML Profile for Modeling and Analysis of Real Time Embedded Systems (MARTE)"},{"key":"ref46","article-title":"the psr methodology: integrating hardware and software models","volume":"1091","author":"donatelli","year":"1996","journal-title":"Proc 15th Int Conf Application and Theory of Petri Nets"},{"key":"ref45","first-page":"95","article-title":"interval computations: introduction, uses, and resources","volume":"2","author":"kearfott","year":"1996","journal-title":"Euromath Bulletin"},{"key":"ref48","year":"1996","journal-title":"ARP4761 Aerospace Recommended Practise Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airbone Systems and Equipment"},{"key":"ref47","author":"upton","year":"2002","journal-title":"Oxford Dictionary of Statistics"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.36"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041054"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2004.1348019"},{"key":"ref43","first-page":"11","article-title":"sophia: a modeling language for model-based safety engineering","author":"cancila","year":"2009","journal-title":"Proc 1st Int Workshop on Model Based Architecting and Construction of Embedded Systems"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9424\/5709247\/05669362.pdf?arnumber=5669362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:46:02Z","timestamp":1633909562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5669362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":51,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tii.2010.2098415","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2]]}}}