{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:25:42Z","timestamp":1768584342432,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T00:00:00Z","timestamp":1652832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"DFG","award":["435878599"],"award-info":[{"award-number":["435878599"]}]},{"name":"FWF","award":["I 4701-N"],"award-info":[{"award-number":["I 4701-N"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,18]]},"DOI":"10.1145\/3524844.3528062","type":"proceedings-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T22:07:50Z","timestamp":1660601270000},"page":"106-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards model co-evolution across self-adaptation steps for combined safety and security analysis"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Witte","sequence":"first","affiliation":[{"name":"Ulm University, Germany"}]},{"given":"Raffaela","family":"Groner","sequence":"additional","affiliation":[{"name":"Ulm University, Germany"}]},{"given":"Alexander","family":"Raschke","sequence":"additional","affiliation":[{"name":"Ulm University, Germany"}]},{"given":"Matthias","family":"Tichy","sequence":"additional","affiliation":[{"name":"Ulm University, Germany"}]},{"given":"Irdin","family":"Pekaric","sequence":"additional","affiliation":[{"name":"University of Innsbruck, Austria"}]},{"given":"Michael","family":"Felderer","sequence":"additional","affiliation":[{"name":"University of Innsbruck, Austria"}]}],"member":"320","published-online":{"date-parts":[[2022,8,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Parametric analyses of attack-fault trees. CoRR abs\/1902.04336","author":"Andr\u00e9 \u00c9tienne","year":"2019","unstructured":"\u00c9tienne Andr\u00e9 , Didier Lime , Mathias Ramparison , and Mari\u00eblle Stoelinga . 2019. Parametric analyses of attack-fault trees. CoRR abs\/1902.04336 ( 2019 ). arXiv:1902.04336 http:\/\/arxiv.org\/abs\/1902.04336 \u00c9tienne Andr\u00e9, Didier Lime, Mathias Ramparison, and Mari\u00eblle Stoelinga. 2019. Parametric analyses of attack-fault trees. CoRR abs\/1902.04336 (2019). arXiv:1902.04336 http:\/\/arxiv.org\/abs\/1902.04336"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16145-2_9"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08915-7_2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15545-6_33"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSOS52086.2021.00025"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.10201"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00023"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.37"},{"key":"e_1_3_2_1_9_1","volume-title":"2013 5th International Conference on Cyber Conflict (CYCON","author":"Kotenko Igor","year":"2013","unstructured":"Igor Kotenko and Andrey Chechulin . 2013 . A Cyber Attack Modeling and Impact Assessment framework . In 2013 5th International Conference on Cyber Conflict (CYCON 2013). 1--24. Igor Kotenko and Andrey Chechulin. 2013. A Cyber Attack Modeling and Impact Assessment framework. In 2013 5th International Conference on Cyber Conflict (CYCON 2013). 1--24."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22975-1_11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055193"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.020"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 14th Conference on USENIX Security Symposium -","volume":"14","author":"Ou Xinming","unstructured":"Xinming Ou , Sudhakar Govindavajhala , and Andrew W. Appel . 2005. MulVAL: A Logic-Based Network Security Analyzer . In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 (Baltimore, MD) (SSYM'05). USENIX Association, USA, 8. Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel. 2005. MulVAL: A Logic-Based Network Security Analyzer. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 (Baltimore, MD) (SSYM'05). USENIX Association, USA, 8."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.58"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2017.167"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2019.00034"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36249-1_5"},{"key":"e_1_3_2_1_21_1","volume-title":"ICRA workshop on open source software","volume":"3","author":"Quigley Morgan","year":"2009","unstructured":"Morgan Quigley , Ken Conley , Brian Gerkey , Josh Faust , Tully Foote , Jeremy Leibs , Rob Wheeler , Andrew Y Ng , 2009 . ROS: an open-source Robot Operating System . In ICRA workshop on open source software , Vol. 3 . Kobe, Japan, 5. Morgan Quigley, Ken Conley, Brian Gerkey, Josh Faust, Tully Foote, Jeremy Leibs, Rob Wheeler, Andrew Y Ng, et al. 2009. ROS: an open-source Robot Operating System. In ICRA workshop on open source software, Vol. 3. Kobe, Japan, 5."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2015.03.001"},{"key":"e_1_3_2_1_23_1","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"Schneier Bruce","unstructured":"Bruce Schneier . 2015. Secrets and Lies: Digital Security in a Networked World . Wiley . Bruce Schneier. 2015. Secrets and Lies: Digital Security in a Networked World. Wiley."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSOS49614.2020.00024"},{"key":"e_1_3_2_1_25_1","volume-title":"32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP","author":"Steiner Max","year":"2013","unstructured":"Max Steiner and Peter Liggesmeyer . 2013. Combination of Safety and Security Analysis - Finding Security Problems That Threaten the Safety of a System . In 32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP 2013 ). Workshops and Tutorials : CARS , SASSUR, DECS, ASCOMS. http:\/\/nbn-resolving.de\/urn:nbn:de:hbz:386-kluedo-43604 Max Steiner and Peter Liggesmeyer. 2013. Combination of Safety and Security Analysis - Finding Security Problems That Threaten the Safety of a System. In 32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP 2013). Workshops and Tutorials : CARS, SASSUR, DECS, ASCOMS. http:\/\/nbn-resolving.de\/urn:nbn:de:hbz:386-kluedo-43604"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61470-0_12"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-013-0394-9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28005-5_32"},{"key":"e_1_3_2_1_30_1","volume-title":"Risks and Security of Internet and Systems, Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, and Fr\u00e9d\u00e9ric Cuppens (Eds.)","author":"Viertel Fabien Patrick","unstructured":"Fabien Patrick Viertel , Fabian Kortum , Leif Wagner , and Kurt Schneider . 2019. Are Third-Party Libraries Secure? A Software Library Checker for Java . In Risks and Security of Internet and Systems, Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, and Fr\u00e9d\u00e9ric Cuppens (Eds.) . Springer International Publishing , Cham , 18--34. Fabien Patrick Viertel, Fabian Kortum, Leif Wagner, and Kurt Schneider. 2019. Are Third-Party Libraries Secure? A Software Library Checker for Java. In Risks and Security of Internet and Systems, Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, and Fr\u00e9d\u00e9ric Cuppens (Eds.). Springer International Publishing, Cham, 18--34."}],"event":{"name":"SEAMS '22: 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems","location":"Pittsburgh Pennsylvania","acronym":"SEAMS '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524844.3528062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524844.3528062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:36Z","timestamp":1750183776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524844.3528062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,18]]},"references-count":29,"alternative-id":["10.1145\/3524844.3528062","10.1145\/3524844"],"URL":"https:\/\/doi.org\/10.1145\/3524844.3528062","relation":{},"subject":[],"published":{"date-parts":[[2022,5,18]]},"assertion":[{"value":"2022-08-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}