{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T02:12:42Z","timestamp":1722478362837},"reference-count":31,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET softw."],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1049\/iet-sen.2011.0081","type":"journal-article","created":{"date-parts":[[2013,2,25]],"date-time":"2013-02-25T21:01:41Z","timestamp":1361826101000},"page":"29-46","source":"Crossref","is-referenced-by-count":10,"title":["Risk analysis: a guiding force in the improvement of testing"],"prefix":"10.1049","volume":"7","author":[{"given":"Mitrabinda","family":"Ray","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela 769008 Orissa India"}]},{"given":"Durga Prasad","family":"Mohapatra","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela 769008 Orissa India"}]}],"member":"265","published-online":{"date-parts":[[2013,2]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"Software safety. Nasa Technical Standard September1997"},{"key":"e_1_2_7_3_1","unstructured":"Procedures for performing a failure mode effects and criticality analysis. Defense Department US MIL STD 1629A\/Notice 2 November1984"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.199724"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.328991"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346564"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234477"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"Lyu M.R.: \u2018Software reliability engineering: a roadmap\u2019.FOSE '07: 2007 Future of Software Engineering Washington DC USA 2007 pp.153\u2013170","DOI":"10.1109\/FOSE.2007.24"},{"issue":"1","key":"e_1_2_7_9_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TSE.2005.12","article-title":"Model-based performance risk analysis","volume":"31","author":"Cortellessa V.","year":"2005","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1010058"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1237174"},{"key":"e_1_2_7_12_1","unstructured":"Luke S.R.: \u2018Failure mode effects and criticality analysis (FMECA) for software\u2019.Fifth Fleet Maintenance Symp. Virginia Beach VA USA October1995 pp.731\u2013735"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.11.002"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00019-4"},{"key":"e_1_2_7_15_1","unstructured":"Feather M.S. Cornford S.L. Dunphy J. Hicks K.: \u2018A quantitative risk model for early lifecycle decision making\u2019.Sixth World Conf. on Integrated Design and Process Technology Pasadena CA USA June2002 pp.1\u20138"},{"key":"e_1_2_7_16_1","unstructured":"Cornford S.L. Feather M.S.: \u2018DDP: a tool for life-cycle risk management\u2019.IEEE Aerospace Conf. Big Sky Montana March 2001 pp.441\u2013451"},{"key":"e_1_2_7_17_1","unstructured":"Appukkutty K. Ammar H.H. Popstajanova K.G.: \u2018Software requirement risk assessment using UML\u2019.AICCSA '05: Proc. ACS\/IEEE 2005 Int. Conf. on Computer Systems and Applications Washington DC USA 2005 pp.112\u2013115"},{"key":"e_1_2_7_18_1","volume-title":"Fundamentals of software engineering","author":"Mall R.","year":"2009"},{"issue":"04","key":"e_1_2_7_19_1","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/TR.2004.838034","article-title":"Scenario-based reliability analysis of component-based software","volume":"53","author":"Yacoub S.M.","year":"2004","journal-title":"IEEE Trans. Reliab."},{"key":"e_1_2_7_20_1","unstructured":"Krishnamurthy S. Mathur A.P.: \u2018On the estimation of reliability of a software system using reliabilities of its components\u2019.ISSRE '97: Proc. Eighth Int. Symp. on Software Reliability Engineering Washington DC USA 1997 pp.146"},{"key":"e_1_2_7_21_1","unstructured":"Distefano S. Xing L.: \u2018A new approach to modeling the system reliability: dynamic reliability block diagrams\u2019.Reliability and Maintainability Symp. 2006 pp.189\u2013195"},{"key":"e_1_2_7_22_1","volume-title":"Testing object-oriented systems \u2013 models, patterns and tools","author":"Binder R.V.","year":"2000"},{"key":"e_1_2_7_23_1","unstructured":"Burgess M.: Fault tree creation and analysis tool: user manual 2003. Available at:http:\/\/www.iu.hio.no\/FaultCat"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018929719710"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"Garousi V. Briand L.C. Labiche Y.: \u2018Analysis and visualization of behavioral dependencies among distributed objects based on UML models\u2019. Technical Report TR SCE-06-03 Carleton University Ottawa Canada March2006","DOI":"10.1007\/11880240_26"},{"key":"e_1_2_7_26_1","first-page":"339","volume-title":"Reliability prediction in model-driven development","author":"Rodrigues G.N.","year":"2005"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011429104252"},{"key":"e_1_2_7_28_1","unstructured":"Johannessen P. Grante C. Alminger A. Eklund U. Torin J.: \u2018Hazard analysis in object oriented design of dependable systems\u2019.DSN '01: Proc. 2001 Int. Conf. on Dependable Systems and Networks (formerly: FTCS) Washington DC USA 2001 pp.507\u2013512"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/163359.163373"},{"key":"e_1_2_7_30_1","unstructured":"Xiang J. Futatsugi K. He Y.: \u2018Fault tree and formal methods in system safety analysis\u2019.Fourth Int. Conf. on Computer and Information Technology Wuhan China 2004 pp.1108\u20131115"},{"key":"e_1_2_7_31_1","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.entcs.2007.05.034","article-title":"Formal fault tree analysis \u2013 practical experiences","volume":"185","author":"Ortmeiera F.","year":"2007","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(83)90030-4"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2011.0081","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-sen.2011.0081","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2011.0081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T05:25:01Z","timestamp":1612589101000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-sen.2011.0081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["10.1049\/iet-sen.2011.0081"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2011.0081","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}