{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T05:09:12Z","timestamp":1768453752296,"version":"3.49.0"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007458","name":"Qatar Foundation","doi-asserted-by":"publisher","award":["NPRP 9-005-1-002"],"award-info":[{"award-number":["NPRP 9-005-1-002"]}],"id":[{"id":"10.13039\/100007458","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tr.2022.3163652","type":"journal-article","created":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T19:33:33Z","timestamp":1650656013000},"page":"1075-1091","source":"Crossref","is-referenced-by-count":18,"title":["Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0958-1633","authenticated-orcid":false,"given":"Ashraf","family":"Tantawy","sequence":"first","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, Leicester, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sherif","family":"Abdelwahed","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Commonwealth University, Richmond, VA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8333-3454","authenticated-orcid":false,"given":"Abdelkarim","family":"Erradi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Qatar University, Doha, Qatar"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5068"},{"key":"ref3","volume-title":"Safety Instrumented Systems: Design, Analysis, and Justification","author":"Gruhn","year":"2006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3403\/pdiectr61511"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2009.08.076"},{"key":"ref6","volume":"29","author":"Swales","year":"1999","journal-title":"Open Modbus\/TCP Specification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.86"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04468-7_21"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101864"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21236\/ADA387544"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2019.8902372"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-82e2008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS52919.2021.9486384"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"ref16","volume-title":"NVDHome","year":"2016"},{"key":"ref17","volume-title":"OREDA Offshore and Onshore Reliability Data Volume 1Topside Equipment","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/9781118948743"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/c2014-0-04859-9"},{"key":"ref20","volume-title":"Hazop and Hazan: Identifying and Assessing Process Industry Hazards","author":"Skelton","year":"1999"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/prs.680180409"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585593"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3403\/bseniec62443-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/SICE.2017.8105699"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3403\/30300358"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2514\/6.2020-0242"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987635"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/electronics2010041"},{"issue":"7","key":"ref30","first-page":"411","article-title":"CyberSafety: On the interactions between cybersecurity and the software engineering of safety-critical systems","volume":"21","author":"Johnson","year":"2012","journal-title":"Lab. Med."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852754"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EFTA.2007.4416910"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638412"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2028364"},{"key":"ref35","article-title":"Relationship between security and safety in a security-safety critical system: Safety consequences of security threats","author":"Srby","year":"2003"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1175-5_11"},{"key":"ref37","first-page":"147","article-title":"Integrating safety and security into the system lifecycle","volume-title":"Proc. Improving Syst. Softw. Eng. Conf.","author":"Hunter","year":"2009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45416-0_2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10506-2_21"},{"key":"ref40","volume-title":"GSN Community Standard Version 1","year":"2011"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-130-x_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2294628"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.020"},{"key":"ref44","first-page":"1","article-title":"Combination of safety and security analysisFinding security problems that threaten the safety of a system","volume-title":"Proc. 32nd Int. Conf. Comput. Saf., Rel. Secur.","author":"Steiner","year":"2013"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.12"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00143-1"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10506-2_22"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378942"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.10.010"},{"key":"ref51","article-title":"Modeling and analysis of safety-critical cyber physical systems using state\/event fault trees","volume-title":"Proc. 32nd Int. Conf. Comput. Saf., Rel. Secur.","author":"Roth","year":"2013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2240891"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref54","first-page":"1393","article-title":"Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on Bayesian belief networks","volume-title":"Proc. Federated Conf. Comput. Sci. Inf. Syst.","author":"Kornecki","year":"2013"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73947-2_20"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31072-0_24"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45221-8_31"},{"key":"ref59","first-page":"412","volume-title":"UMLsec: Extending UML for Secure Systems Development","volume":"2460","author":"Jrjens","year":"2002"},{"key":"ref60","article-title":"Developing safety-and security-critical systems with UML","volume-title":"Proc. DARP Workshop, Loughborough, U.K.","author":"Jrjens","year":"2003"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2011.5957992"},{"key":"ref62","article-title":"Extending and automating STPA for requirements generation and analysis","author":"Thomas","year":"2013"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.05.008"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9787285\/09761964.pdf?arnumber=9761964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:27:06Z","timestamp":1705958826000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9761964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":64,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3163652","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}