{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:09:27Z","timestamp":1775146167595,"version":"3.50.1"},"reference-count":104,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior","doi-asserted-by":"publisher","award":["88887.954253\/2024-00"],"award-info":[{"award-number":["88887.954253\/2024-00"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3590244","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T18:00:13Z","timestamp":1752775213000},"page":"127770-127787","source":"Crossref","is-referenced-by-count":1,"title":["A Survey on Survivable Safety-Critical Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0468-9557","authenticated-orcid":false,"given":"Helber","family":"Silva","sequence":"first","affiliation":[{"name":"Instituto Metropole Digital, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9936-3770","authenticated-orcid":false,"given":"Augusto","family":"Neto","sequence":"additional","affiliation":[{"name":"Department of Informatics and Applied Mathematics, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107641"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106669"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.03.031"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581406"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898391"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.43"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3226030"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s40294-020-00070-w"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-021-00238-2"},{"issue":"5","key":"ref10","first-page":"1","article-title":"A survey of cyber attack detection systems","volume":"9","author":"Singh","year":"2009","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2915045"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2514\/6.2009-1922"},{"issue":"1","key":"ref13","first-page":"19","article-title":"A survivable Internet of Things scheme","volume":"13","author":"Alhazmi","year":"2018","journal-title":"J. Adv. Res. Comput. Appl."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570685"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2022.03.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3289625"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8348925"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102223"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119771"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.hspr.2022.12.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.09.010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.7298r3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21236\/ADA341963"},{"key":"ref27","article-title":"Introduction to the controller area network (can)","author":"Corrigan","year":"2016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.011812.100071"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon47679.2020.9381831"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.06.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/35.1.3"},{"key":"ref32","volume-title":"Security in Telecommunications and Information Technology: An Overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/4236.807008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/9780470172438"},{"key":"ref35","article-title":"How resilient is your organisation? An introduction to the resilience analysis grid (rag)","volume-title":"Sustainable Transformation: Building a Resilient Organization","author":"Hollnagel","year":"2010"},{"key":"ref36","volume-title":"Safeware: System Safety and Computers","author":"Leveson","year":"1995"},{"issue":"12","key":"ref37","first-page":"28","article-title":"Safety first: Avoiding software mishaps","volume":"13","author":"Knutson","year":"2000","journal-title":"Embedded Syst. Program."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.400772"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8568","volume-title":"Network Virtualization Research Challenges","author":"Bernardos","year":"2019"},{"key":"ref40","volume-title":"Software-defined Networking (SDN): Layers and Architecture Terminology","author":"Haleplidis","year":"2015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ELECTRONICA52725.2021.9513681"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.11.031"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2963255"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1244533"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2547742"},{"key":"ref46","first-page":"1","article-title":"False data injection attacks in control systems","volume-title":"Proc. 1st Workshop Secure Control Syst.","volume":"1","author":"Mo"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018987"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS48030.2020.9153599"},{"key":"ref50","first-page":"G8","article-title":"From dependability to resilience","volume-title":"Proc. 38th IEEE\/IFIP Int. Conf. Dependable Syst. Netw.","author":"Laprie"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265710"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100568"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03184-1"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8872923"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2019.00023"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3934\/electreng.2019.2.111"},{"key":"ref58","article-title":"Procedures for performing systematic reviews","author":"Kitchenham","year":"2004"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01171-0_2"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/9780470754887"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.328.7454.1490"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/9780470712184"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695902"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/EASE2006.10"},{"issue":"4","key":"ref65","article-title":"Undertaking systematic reviews of research on effectiveness: CRD\u2019s guidance for carrying out or commissioning reviews","author":"Khan","year":"2001"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/9781119536604"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon53073.2023.10131114"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1177\/1937586717747384"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100639"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111716"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/DASC58513.2023.10311248"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2021.108863"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720756"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102309"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2019.102954"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101761"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100201"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8692843"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24777-7_11"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2017.11.002"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3309171.3309172"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_38"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980523"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/jsan11010006"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2018.1490046"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1984.1676394"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/62.666831"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000797"},{"key":"ref89","article-title":"Security considerations for Internet of Things","volume-title":"Technol. Services","author":"Jha","year":"2014"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN53993.2022.9758028"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3202710.3203159"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s002870200223"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92901-9_19"},{"key":"ref94","volume-title":"Microsoft Security Development Lifecycle (SDL)","year":"2023"},{"key":"ref95","volume-title":"Open Web Application Security Project (OWASP)","author":"Foundation","year":"2022"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383290"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3361160"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200140"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/app13031469"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA59173.2023.10479294"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3161933"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105396"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11083532.pdf?arnumber=11083532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T04:42:36Z","timestamp":1754023356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11083532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":104,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3590244","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}