{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:24:58Z","timestamp":1717028698162},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1016\/j.cose.2024.103890","type":"journal-article","created":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T08:47:58Z","timestamp":1714985278000},"page":"103890","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system"],"prefix":"10.1016","volume":"142","author":[{"given":"Yufeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Chengjian","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3893-7731","authenticated-orcid":false,"given":"Ke","family":"Sun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2024.103890_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.107484","article-title":"A multinomial process tree for reliability assessment of machinery in autonomous ships","volume":"210","author":"Abaei","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.cose.2024.103890_b2","series-title":"Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings 36","first-page":"329","article-title":"Systematic pattern approach for safety and security co-engineering in the automotive domain","author":"Amorim","year":"2017"},{"issue":"2","key":"10.1016\/j.cose.2024.103890_b3","doi-asserted-by":"crossref","first-page":"320","DOI":"10.31603\/ae.8394","article-title":"Enhancing brake system evaluation in periodic testing of goods transport vehicles through FTA-FMEA risk analysis","volume":"6","author":"Ansori","year":"2023","journal-title":"Automot. Exp."},{"key":"10.1016\/j.cose.2024.103890_b4","unstructured":"Banda, O.A.V., Kannos, S., 2017. Hazard Analysis Process for Autonomous Vessels. Technical Report."},{"key":"10.1016\/j.cose.2024.103890_b5","series-title":"Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems","first-page":"155","article-title":"Secure by design autonomous emergency braking systems in accordance with ISO 21434","author":"Berdich","year":"2023"},{"key":"10.1016\/j.cose.2024.103890_b6","series-title":"Digital Marketplaces Unleashed","first-page":"427","article-title":"An overview of technology, benefits and impact of automated and autonomous driving on the automotive industry","author":"Brenner","year":"2018"},{"key":"10.1016\/j.cose.2024.103890_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.aap.2021.106092","article-title":"The development and validation of the perceived safety of intelligent connected vehicles scale","volume":"154","author":"Cao","year":"2021","journal-title":"Accid. Anal. Prev."},{"key":"10.1016\/j.cose.2024.103890_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.oceaneng.2022.111797","article-title":"Towards system-theoretic risk assessment for future ships: A framework for selecting Risk Control Options","volume":"259","author":"Chaal","year":"2022","journal-title":"Ocean Eng."},{"issue":"4","key":"10.1016\/j.cose.2024.103890_b9","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1080\/00031305.1995.10476177","article-title":"Understanding the metropolis-hastings algorithm","volume":"49","author":"Chib","year":"1995","journal-title":"Amer. Statist."},{"key":"10.1016\/j.cose.2024.103890_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2018.12.006","article-title":"A review on safety failures, security attacks, and available countermeasures for autonomous vehicles","volume":"90","author":"Cui","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.cose.2024.103890_b11","article-title":"Extending STPA with STRIDE to identify cybersecurity loss scenarios","volume":"55","author":"De Souza","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"issue":"1\u20133","key":"10.1016\/j.cose.2024.103890_b12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jhazmat.2009.08.076","article-title":"Hazard and operability (HAZOP) analysis. A literature review","volume":"173","author":"Dunj\u00f3","year":"2010","journal-title":"J. Hazard. Mater."},{"key":"10.1016\/j.cose.2024.103890_b13","first-page":"183","article-title":"STPA-SafeSec: Safety and security analysis for cyber-physical systems","volume":"34","author":"Friedberg","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.cose.2024.103890_b14","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.ress.2017.06.021","article-title":"Unmanned aerial vehicle safety assessment modelling through petri Nets","volume":"167","author":"Gon\u00e7alves","year":"2017","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.cose.2024.103890_b15","article-title":"The jeep hackers are back to prove car hacking can get much worse","volume":"8","author":"Greenberg","year":"2016","journal-title":"Wired Mag."},{"key":"10.1016\/j.cose.2024.103890_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2022.108850","article-title":"Risk evolution analysis of ship pilotage operation by an integrated model of FRAM and DBN","volume":"229","author":"Guo","year":"2023","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.cose.2024.103890_b17","series-title":"FRAM: The Functional Resonance Analysis Method: Modelling Complex Socio-Technical Systems","author":"Hollnagel","year":"2017"},{"issue":"2","key":"10.1016\/j.cose.2024.103890_b18","doi-asserted-by":"crossref","first-page":"509","DOI":"10.2514\/1.A32449","article-title":"Hazard analysis of complex spacecraft using systems-theoretic process analysis","volume":"51","author":"Ishimatsu","year":"2014","journal-title":"J. Spacecr. Rockets"},{"key":"10.1016\/j.cose.2024.103890_b19","series-title":"2024 IEEE Symposium on Security and Privacy","first-page":"80","article-title":"Revisiting automotive attack surfaces: a practitioners\u2019 perspective","author":"Jing","year":"2023"},{"key":"10.1016\/j.cose.2024.103890_b20","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.eswa.2017.01.058","article-title":"An overview of fault tree analysis and its application in model based dependability analysis","volume":"77","author":"Kabir","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.cose.2024.103890_b21","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.ssci.2019.02.009","article-title":"Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review","volume":"115","author":"Kabir","year":"2019","journal-title":"Saf. Sci."},{"key":"10.1016\/j.cose.2024.103890_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.107610","article-title":"Systems approach to creating test scenarios for automated driving systems","volume":"215","author":"Khastgir","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.cose.2024.103890_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.102150","article-title":"Cybersecurity for autonomous vehicles: Review of attacks and defense","volume":"103","author":"Kim","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2024.103890_b24","series-title":"The Reliability of Electronicallly Controlled Systems on Vehicles","author":"Knight","year":"2001"},{"key":"10.1016\/j.cose.2024.103890_b25","series-title":"2019 IEEE Intelligent Transportation Systems Conference","first-page":"2969","article-title":"Comparison of hazard analysis methods with regard to the series development of autonomous vehicles","author":"K\u00f6lln","year":"2019"},{"key":"10.1016\/j.cose.2024.103890_b26","series-title":"Computer Safety, Reliability, and Security: 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings 33","first-page":"326","article-title":"Safety and security interactions modeling using the BDMP formalism: case study of a pipeline","author":"Kriaa","year":"2014"},{"key":"10.1016\/j.cose.2024.103890_b27","series-title":"2017 IEEE 18th International Symposium on High Assurance Systems Engineering","first-page":"25","article-title":"Quantitative security and safety analysis with attack-fault trees","author":"Kumar","year":"2017"},{"key":"10.1016\/j.cose.2024.103890_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.114066","article-title":"Cosine similarity based anomaly detection methodology for the CAN bus","volume":"166","author":"Kwak","year":"2021","journal-title":"Expert Syst. Appl."},{"issue":"9","key":"10.1016\/j.cose.2024.103890_b29","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/3411053","article-title":"Autonomous vehicle safety: lessons from aviation","volume":"63","author":"Lala","year":"2020","journal-title":"Commun. ACM"},{"issue":"4","key":"10.1016\/j.cose.2024.103890_b30","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0925-7535(03)00047-X","article-title":"A new accident model for engineering safer systems","volume":"42","author":"Leveson","year":"2004","journal-title":"Saf. Sci."},{"issue":"6","key":"10.1016\/j.cose.2024.103890_b31","doi-asserted-by":"crossref","first-page":"1848","DOI":"10.3390\/s24061848","article-title":"Complying with ISO 26262 and ISO\/SAE 21434: A safety and security co-analysis method for intelligent connected vehicle","volume":"24","author":"Li","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.cose.2024.103890_b32","doi-asserted-by":"crossref","DOI":"10.1109\/MVT.2023.3263334","article-title":"Dynamic heterogeneous redundancy-based joint safety and security for connected automated vehicles: preliminary simulation and field test results","volume":"18","author":"Li","year":"2023","journal-title":"IEEE Veh. Technol. Mag."},{"key":"10.1016\/j.cose.2024.103890_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2022.108373","article-title":"Analysis of simplification in Markov state-based models for reliability assessment of complex safety systems","volume":"221","author":"Liang","year":"2022","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.cose.2024.103890_b34","series-title":"2019 IEEE International Conference on Connected Vehicles and Expo","first-page":"1","article-title":"ISO 26262 ASIL-oriented hardware design framework for safety-critical automotive systems","author":"Lu","year":"2019"},{"key":"10.1016\/j.cose.2024.103890_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.pnucene.2023.104841","article-title":"Reliability analysis of safety-critical systems using optimized Petri nets","volume":"164","author":"Mamdikar","year":"2023","journal-title":"Prog. Nucl. Energy"},{"key":"10.1016\/j.cose.2024.103890_b36","series-title":"Advances in Petri Nets 1987 7","first-page":"132","article-title":"On Petri nets with deterministic and exponentially distributed firing times","author":"Marsan","year":"1987"},{"issue":"1","key":"10.1016\/j.cose.2024.103890_b37","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/TR.2013.2240891","article-title":"Effect of intrusion detection and response on reliability of cyber physical systems","volume":"62","author":"Mitchell","year":"2013","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.cose.2024.103890_b38","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/6162829","article-title":"Quantitative risk analysis on rail transportation of hazardous materials","volume":"2022","author":"Mohammadfam","year":"2022","journal-title":"Math. Probl. Eng."},{"issue":"9","key":"10.1016\/j.cose.2024.103890_b39","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1109\/TC.1982.1676110","article-title":"Performance analysis using stochastic Petri nets","volume":"100","author":"Molloy","year":"1982","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"10.1016\/j.cose.2024.103890_b40","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/5.24143","article-title":"Petri nets: Properties, analysis and applications","volume":"77","author":"Murata","year":"1989","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.cose.2024.103890_b41","series-title":"2023 International Conference on Computational Intelligence and Knowledge Economy","first-page":"444","article-title":"Failure modes and effects analysis (FMEA) for electric converted vehicle","author":"Naranje","year":"2023"},{"issue":"2","key":"10.1016\/j.cose.2024.103890_b42","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1108\/IJQRM-09-2019-0305","article-title":"Verification of the IEC 61508 PFH formula for 2oo3 configuration using Markov chains and Petri nets","volume":"38","author":"Omeiri","year":"2021","journal-title":"Int. J. Qual. Reliab. Manag."},{"issue":"1","key":"10.1016\/j.cose.2024.103890_b43","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1049\/iet-cps.2018.0008","article-title":"Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets","volume":"4","author":"Orojloo","year":"2019","journal-title":"IET Cyber-Phys. Syst.: Theory Appl."},{"key":"10.1016\/j.cose.2024.103890_b44","doi-asserted-by":"crossref","DOI":"10.1016\/j.oceaneng.2023.116073","article-title":"On the causation analysis for hazards involved in the engine room fire-fighting system by integrating STPA and BN","volume":"288","author":"Qiao","year":"2023","journal-title":"Ocean Eng."},{"key":"10.1016\/j.cose.2024.103890_b45","unstructured":"Roth, M., Liggesmeyer, P., 2013. Modeling and analysis of safety-critical cyber physical systems using state\/event fault trees. In: SAFECOMP 2013-Workshop DECS (ERCIM\/EWICS Workshop on Dependable Embedded and Cyber-Physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security. p. NA."},{"key":"10.1016\/j.cose.2024.103890_b46","doi-asserted-by":"crossref","DOI":"10.1016\/j.ssci.2023.106084","article-title":"Validation of system safety hazard analysis in safety-critical industries: an interview study with industry practitioners","volume":"161","author":"Sadeghi","year":"2023","journal-title":"Saf. Sci."},{"key":"10.1016\/j.cose.2024.103890_b47","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103179","article-title":"A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS","volume":"128","author":"Sahay","year":"2023","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2024.103890_b48","first-page":"9","article-title":"Requirement generation for highly integrated aircraft systems through STPA: An application","volume":"16","author":"Scarinci","year":"2019","journal-title":"J. Aerosp. Inf. Syst."},{"key":"10.1016\/j.cose.2024.103890_b49","series-title":"Computer Safety, Reliability, and Security: 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings 33","first-page":"310","article-title":"Security application of failure mode and effect analysis (FMEA)","author":"Schmittner","year":"2014"},{"key":"10.1016\/j.cose.2024.103890_b50","series-title":"Computer Safety, Reliability, and Security: SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings 35","first-page":"195","article-title":"Limitation and improvement of STPA-Sec for safety and security co-analysis","author":"Schmittner","year":"2016"},{"key":"10.1016\/j.cose.2024.103890_b51","series-title":"Computer Safety, Reliability, and Security: SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings 33","first-page":"282","article-title":"FMVEA for safety and security analysis of intelligent and cooperative vehicles","author":"Schmittner","year":"2014"},{"key":"10.1016\/j.cose.2024.103890_b52","series-title":"2013 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks Workshop","first-page":"1","article-title":"Practical experiences with real-world systems: Security in the world of reliable and safe systems","author":"Silva","year":"2013"},{"issue":"2","key":"10.1016\/j.cose.2024.103890_b53","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/TCST.2017.2669147","article-title":"Dependability analysis of safety critical real-time systems by using Petri nets","volume":"26","author":"Singh","year":"2017","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"10.1016\/j.cose.2024.103890_b54","series-title":"ISO 26262: Road vehicles functional safety","author":"Standard","year":"2018"},{"key":"10.1016\/j.cose.2024.103890_b55","series-title":"ISO\/SAE 21434: Road vehicles cybersecurity engineering","author":"Standard","year":"2021"},{"key":"10.1016\/j.cose.2024.103890_b56","series-title":"ISO 21448: Road vehicles safety of the intended functionality","author":"Standard","year":"2022"},{"issue":"3","key":"10.1016\/j.cose.2024.103890_b57","article-title":"Comparison of the HAZOP, FMEA, FRAM, and STPA methods for the hazard analysis of automatic emergency brake systems","volume":"8","author":"Sun","year":"2022","journal-title":"ASCE-ASME J. Risk Uncertain. Eng. Syst. Part B: Mech. Eng."},{"key":"10.1016\/j.cose.2024.103890_b58","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.ress.2018.05.019","article-title":"Towards the development of a system-theoretic model for safety assessment of autonomous merchant vessels","volume":"178","author":"Wr\u00f3bel","year":"2018","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.cose.2024.103890_b59","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1007\/s00170-020-06425-0","article-title":"Literature review and prospect of the development and application of FMEA in manufacturing industry","volume":"112","author":"Wu","year":"2021","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"10.1016\/j.cose.2024.103890_b60","series-title":"2021 International Conference on Culture, Design and Social Development","first-page":"1","article-title":"Analysis on the trends and characteristics of vehicle recalls in the United States","author":"Xiaorui","year":"2022"},{"key":"10.1016\/j.cose.2024.103890_b61","doi-asserted-by":"crossref","unstructured":"Young, W., Leveson, N., 2013. Systems thinking for safety and security. In: Proceedings of the 29th Annual Computer Security Applications Conference. pp. 1\u20138.","DOI":"10.1145\/2523649.2530277"},{"key":"10.1016\/j.cose.2024.103890_b62","doi-asserted-by":"crossref","DOI":"10.1016\/j.jlp.2019.103994","article-title":"Development of a FRAM-based framework to identify hazards in a complex system","volume":"63","author":"Yu","year":"2020","journal-title":"J. Loss Prev. Process Ind."},{"key":"10.1016\/j.cose.2024.103890_b63","article-title":"A reliability evaluation method for complex systems based on the editable GSPN and adaptive Monte Carlo simulation","author":"Zeng","year":"2023","journal-title":"Syst. Eng."},{"key":"10.1016\/j.cose.2024.103890_b64","first-page":"1","article-title":"Railway safety risk assessment and control optimization method based on FTA-FPN: A case study of Chinese high-speed railway station","volume":"2020","author":"Zhang","year":"2020","journal-title":"J. Adv. Transp."},{"key":"10.1016\/j.cose.2024.103890_b65","doi-asserted-by":"crossref","DOI":"10.1016\/j.oceaneng.2020.107773","article-title":"Towards applicability evaluation of hazard analysis methods for autonomous ships","volume":"214","author":"Zhou","year":"2020","journal-title":"Ocean Eng."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404824001925?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404824001925?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T11:09:08Z","timestamp":1716980948000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404824001925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":65,"alternative-id":["S0167404824001925"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2024.103890","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2024.103890","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103890"}}