Abstract
This article presents a systematic mapping study on the model‐driven engineering of safety and security concerns in software systems. Combined modeling and development of both safety and security concerns is an emerging field of research as both concerns affect one another in unique ways. Our mapping study provides an overview of the current state of the art in this field. This study carefully selected 143 publications out of 27,259 relevant papers through a rigorous and systematic process. This study then proposes and answers questions such as frequently used methods and tools and development stages where these concerns are typically investigated in application domains. Additionally, we identify the community's preference for publication venues and trends. The discussion on obtained results also features the gained insights and future research directions.
Keywords: model‐driven engineering, safety and security, systematic mapping
This article presents a systematic mapping study on the model‐driven engineering of safety and security concerns in software systems. This study answers research questions such as frequently used methods and tools, development stages, and application domains. An overview of the overlapping between evaluation domains, development stages, and employed methods and tools within the safety and security software systems

1. INTRODUCTION
The notion of (functional) safety is defined as freedom from risk of damage to the user, property, or environment and correct operation of a system in response to its inputs. 1 Security, on the other hand, is the prevention of illegal access causing change and destruction of equipment, information, and services. 2 To contrast safety and security, we say that safety aims to avoid hazards to the system's environment while security seeks to protect a system from its environment. Traditionally, depending upon the domain and the background, software engineers primarily focus on designing systems that are either safe or secure. 3 Typically, we find many methods that investigate these concerns separately. While some exchange of ideas existed across these concerns, modern systems require their thorough, combined treatment because security concerns may affect safety and vice versa. This is particularly true for Cyber‐Physical Systems or Internet of Things (whose components communicate through networks and transcend hardware/software), where there is a good chance for safety concerns to be exposed and thus vulnerable to other types of failures caused by security concerns (or vice versa). 4 Therefore, connected (and consequently exposed) safety systems must be equipped with security mechanisms for protection against such attacks. Only recently, there has been a surge in research focusing on the integrated modeling and development of safety and security systems. 5
Designing software systems dealing with safety and security requires overwhelming information regarding requirements and how those are connected. The model‐driven engineering (MDE) paradigm could assist in the designing of such systems. MDE 6 is a development paradigm that focuses on creating models which could be systematically transformed into (correct) pieces of software. The advantage is that developers can exclusively concentrate on modeling the problem rather than worrying about unnecessary and distracting implementation details. Furthermore, different MDE approaches focus on different aspects of the modeling process. In this regard, MDE is appealing for addressing safety and security concerns where models play an integral role in describing and analyzing them.
Systematic mapping studies are meant to provide an overview of a research area through classification and counting contributions concerning the categories of that classification. They involve searching the available literature to know what topics have been covered and where the corresponding papers have been published. 7 According to Kitchenham et al, 8 the research questions (RQs) in mapping studies are general as they aim to discover research trends (e.g., publication trends over time and topics covered in the literature). This is in contrast to systematic reviews, which intend to aggregate evidence and hence formulate a particular goal (e.g., whether research results are practical and deployable for the industry). 9 The outcome of a mapping study is an inventory of publications on the selected topic mapped to a classification. 10 To sum up the difference, one can say that a systematic mapping study is a quantitative process where we try to assess the overall size and landscape of a specific research field. At the same time, a literature review is a qualitative assessment of a tiny part of the said landscape, and we try to find out how the soil underneath is made up.
This paper presents a systematic mapping study on the MDE of safety and security software systems. The overall aim of this study is to collect the relevant state of the art in this field of research. Besides that, we answer some crucial questions like frequently used methods and tools in this field, their applicable development stages, and in which application domains they have been evaluated. We also identify where the community prefers to publish research results and reveal recent publication trends in this field. We carefully selected 143 publications out of 27,259 relevant search results through a rigorous and systematic process. These publications were proven helpful in answering six judiciously crafted RQs, providing gainful insights, and identifying the directions for future research. Furthermore, it gives an overview of which topics in this research area have been more worked on, possible gaps, and an overall trend in the published works.
The article is organized as follows: Section 2 details the systematic mapping process, including the RQs we investigate in this study. Section 3 presents the results of the mapping study. Section 4 presents our analysis of the current state of the art. A brief overview of future research directions in this field is presented in Section 5. Section 6 discusses the threats to the validity of this study and the adopted mitigation strategies. Section 7 discusses the related work concerning similarities in both fields, cross‐fertilization, and other literature reviews. The paper is concluded in Section 8.
2. MAPPING STUDY PROCESS
2.1. Time period
We scope the time of related studies published from 1992 to 2020. The earliest paper in our mapping study was published in 1992, hence the starting time. We searched at the end of 2020, thus the ending time. The search was conducted again in Q1 of 2021 to ensure the completion of results for 2020.
2.2. Digital libraries
Five digital libraries were used in this mapping study: ACM, * IEEE, † Scopus, ‡ Springer, § and Web of Science. ¶ According to Chen at al., 11 these digital libraries are among the most popular sources in computer science and engineering that ensure a high coverage of potentially relevant studies. We did not include Google Scholar # in our mapping study as the search results of Google Scholar tend to be repetitive with respect to results from the included digital libraries, and its unique contribution to the search process is unclear. 11
2.3. Tool
Conducting a systematic mapping study is a tedious and time‐consuming task. It usually involves the search, collection, filtration, and classification of many papers. Without a helping tool, this is a challenging endeavor. In this work, we used Zotero 12 and spreadsheets. These tools helped us in importing, organizing, and analyzing search results. Python's Pandas ‖ and Plotly ** were used to provide the visualizations.
2.4. RQs
The goal of this mapping study (following the guidelines presented by Petersen et al. 7 , 9 ) is to discover what is the current state of the art in the field of MDE of safety and security software systems (and how it can be advanced in the future). This goal leads to the following precise RQs:
-
RQ1: At which development stage the research was conducted?
Rationale: MDE is a multistage development process. Therefore, we want to know at which development stage this research was conducted. Furthermore, this information can help us identify which development stages are susceptible to being focused more on engineering such systems.
-
RQ2: Which methods and tools were employed during the research?
Rationale: The use of methods and tools is inevitable during any research and development activity. This information can help us identify frequently used methods and tools for engineering such systems.
-
RQ3: What is the classification of the research contribution?
Rationale: We want to investigate the contribution type of articles through this question. According to Wieringa et al, 10 contribution types refer to determining the type of intervention being studied. This could be a process, model, language, framework, and so on.
-
RQ4: In which domain(s) research results were evaluated?
Rationale: Safety and security systems may belong to various application domains, for example, railway, nuclear plants, and marine systems. We want to know the application domains in which the research results were evaluated by answering this question. This information can help us identify which application domains have gained more interest from developers of such systems.
-
RQ5: Where was the research published?
Rationale: By answering this question, we want to determine whether researchers prefer to publish in journals, magazines, conferences, or workshops. Usually, journals include more mature and concrete results, whereas conferences and workshops are targeted for timely discussion and early feedback. Thus, by answering this question, we can determine the maturity of the results in this field.
-
RQ6: What is the research publication timeline and trend?
Rationale: Timelines and publication trends tell us about the novelty and frequency of research. We can determine how the community is building around this area by answering this question. Is the topic a relatively new one, gaining popularity in recent years, or just phasing out? This information can help us determine the potential of this research topic.
2.5. Papers search and screening
The mapping study was conducted in six steps, as illustrated in Figure 1.
FIGURE 1.

Steps for the search and selection process
2.5.1. Step 1—Search in digital libraries
The following query performed in the digital libraries produced 27,259 search results.
(“model‐driven” OR “model‐based”) AND (“engineering” OR “development”) AND (“safety” OR “safe”) AND (“security” OR “secure”)
Digital library‐wise acquired results are shown in Figure 1. The Springer digital library produced the maximum number of results, followed by the ACM Digital Library. The search process was simple in ACM, Scopus, Springer, and Web of Science digital libraries. The basic search fields were enough to run the query, which required no further processing. However, we had to use the advance search option in the IEEE Digital Library; we wrote the query in the command search and obtained the results.
The search terms were identified according to the study topic. Like Kitchenham and Charters, 13 we adopted the Population, Intervention, Comparison, Outcomes (PICO) criteria to formulate the search terms.
Population: According to Kitchenham and Charters, 13 the population may refer to a specific software engineering role, a category of software engineers, an application area, or an industry group. In our case, population is the terms about “safety/safe” and “security/secure.”
Intervention: According to Kitchenham and Charters, 13 intervention may refer to a software methodology, a tool, a technology, or a procedure. In the context of this study, the intervention includes the terms “model‐driven” or “model‐based.”
Comparison: The comparison part is not applicable in this mapping study because this mapping study does not involve the comparison of model‐driven and other types of approaches.
Outcomes: Outcomes include the terms relevant to “engineering” or “development” activities.
We used the Boolean operator OR to join alternate words and synonyms in each part (i.e., population, intervention, and outcomes) and the Boolean operator AND to join the terms from the three parts, respectively.
2.5.2. Step 2—Inclusion and exclusion of results
To make the study selection results objective, we defined the selection criteria employed in the study selection process. This brought down the overall result count from 27,259 to 8899 papers. The criteria are as follows:
Inclusion criteria:
peer‐reviewed studies published in conferences, workshops, journals, magazines, or books;
studies classified as computer science publications; and
studies published in English.
Exclusion criteria:
studies published as courses, newsletters, reports, reference work entries, and so on;
studies not accessible in full text; and
Studies presenting non‐peer‐reviewed results or gray literature.
2.5.3. Step 3—Meta‐data lookup
We carefully checked the available meta‐data, for example, keywords and abstracts, of results in this step. First, we filtered out all those results that did not focus on “safety” and “security,” that is, they did not use those terms in their meta‐data. This brought down our results tally to 1004.
2.5.4. Step 4—Manual title search
Despite the meta‐data lookup, some publications could still be included in the results, only remotely dealing with safety and security concerns. To ensure that the final result only includes high‐quality, relevant papers, we manually checked the title of each paper. We confirmed that each paper title has something to do with safety and security. As a result of this step, our result count became 89.
2.5.5. Step 5—Check for duplicate results
Once we individually checked the results produced by each digital library, we merged them into a single repository. Because many digital libraries index the same venues, the search results may be redundant. To have a list of unique results, we check the list of merged results for duplicates in this step. Consequently, all duplicates were removed from the results list, and the publication count became 68.
2.5.6. Step 6—Snowballing
In this last step, we performed snowballing readings. Snowballing refers to using the reference list of a paper or the citations to the paper to identify additional papers. 14 For each paper identified for possible inclusion, we applied the same criteria employed to select papers in the first place. Then, we identified 75 further relevant studies in this step. After this, the final set of results reached the tally of 143 publications.
Because we performed both backward and forward snowballing, we discovered a relatively large number of new studies. However, a large number of found studies during snowballing is not so wrong because, according to Wohlin, 14 the possibility of noise in snowballing is less than using a digital library approach, and, by deduction, snowballing is a better approach than a digital library search for extending literature studies.
2.6. Studies classification scheme
The classification scheme used for this study follows a systematic process suggested by Petersen et al. 7 , 9 We are using keywords as bases for studies classification. Initially, we read abstracts to find representative keywords and concepts. The set of extracted keywords from different studies are then unified to overview the nature and contribution of the research (e.g., as shown in Figure 3, studies might not use “formal methods” as a keyword, but the name of the method, e.g., “Alloy”). This would create a category for each formal method, and therefore, to avoid this situation, different formal methods were merged into a single category). This results in a set of categories representing the underlying population. Sometimes meaningful keywords could not be extracted from the abstract alone. In such cases, either introduction and conclusion sections were studied, or complete papers were skimmed through. Upon selecting the final set of keywords, they are clustered and consequently used to form the categories. Where applicable, classifications were also based on the Software Engineering Body of Knowledge (SWEBOK) † structure (e.g., as shown in Figure 2, which are the main life‐cycle activities of software engineering) or inspired from previous categorizations (e.g., as shown in Figure 4, which is based on the work of Wieringa et al. 10 ).
FIGURE 3.

RQ2: Studies classification based on applied methods and tools
FIGURE 2.

RQ1: Studies classification based on development stages
FIGURE 4.

RQ3: Studies classification based on contributions
To reduce any bias, we followed an iterative strategy. Three experienced researchers (listed as the first three authors of this article) participated in the study. Initially, the first author classified all primary studies as mentioned in Step 3 and Step 4 of Figure 1. The second author then reviewed the classifications and corrected them, where necessary, based on the meta‐data lookup (Step 3). In case of a disagreement, the third author independently reviewed the classification and judged. The opinion of the majority prevailed. However, the disagreement only occurred rarely. Although all participants of this study are senior and experienced researchers (while the first author has an industrial background, the second and third authors are university professors), this step involves human judgment. This again leads to the threat of bias, which cannot be eliminated entirely. This point is further elaborated in Section 6.
2.7. Data extraction and synthesis
To answer the RQs, we extracted specific data from selected publications. Table 1 describes data items that have been extracted in this mapping study.
TABLE 1.
Extracted research items
| Item name | Description | Relevant RQ |
|---|---|---|
| Development stage | At which development stage was the research applicable? | RQ1 |
| Method/tool | What is the deployed method or tool in the research? | RQ2 |
| Contribution classification | What is the classification of contribution of the research? | RQ3 |
| Application domain | Which application domain the research was applied to? | RQ4 |
| Publication type | What is the publication type of the research? | RQ5a |
| Publication venue | In which venue was the research published? | RQ5b |
| Publication year | In which year was the research published? | RQ6 |
Data synthesis targets to synthesize the extracted data to answer the RQs. The results of this task are discussed (also visually) in the following section.
3. MAPPING STUDY RESULTS
The results of the mapping study are shown in Table A1 (for convenience, located in Appendix A1) in chronological order. The whole table can also be accessed online. ‡‡ Please note that the names of publication venues are not listed here for brevity. Apart from the method/tool column, Table A1 contains the main categories of the entries, and subcategories are mentioned only in the discussion on the relevant RQ. We now synthesize the extracted data to answer previously listed RQs.
3.1. Development stages (RQ1)
Figure 2 shows the results of RQ1. Each study is counted only once in its respective category. “All” denotes studies covering the whole spectrum of MDE, that is, all development stages. “None” denotes studies that did not focus on any development stage.
Only a few studies (7 out of 143) covered the whole MDE spectrum, i.e., all development stages. Hassan et al 15 were discussing the idea of how the Formal Analysis and Design for Engineering Security (FADES) approach can be used to support the model‐based software engineering (MBSE) paradigm. Bloomfield et al 16 use the structured safety cases approach to discuss the impact that security might have on an existing safety case. Apvrille et al 17 presented a similar idea based on the SysML‐Sec environment covering all the development stages. Pedroza 18 presents a synthetic discussion on the safety and security topics along with some perspectives across all MDE stages. However, these studies did not use any application domain to evaluate the proposed approaches. The approach presented in Benyó et al, 19 on the other hand, discussed the design and development of a smart card application management infrastructure by specifying business and technological processes and associated security requirements. Sabaliauskaite et al 20 proposed the AVES framework for systematic model‐based analysis of safety and security properties of the automotive domain. Tang et al 21 presented a domain‐specific modeling language to model smart home IoT applications and generated code out of the model.
Although the planning phase is crucial for the successful development of a system, only one study has focused on this stage. In this study, Park et al 22 discuss how multiagent systems (MAS) and swarm intelligence can be exploited to boost counterterrorism and public safety activities using a rescue system example.
As anticipated, most of the studies (51 out of 143) were focusing on the level of requirements. Fifteen studies 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 out of those 51 were focusing exclusively on requirements modeling of such systems. Thirty‐one studies 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 were focusing on both requirements modeling and analysis. A few studies were either focusing solely on requirements analysis 69 , 70 , 71 , 72 or requirements traceability. 73
The architecture and design stages are of paramount importance in the development of any system; safety and security systems are no exceptions. Forty‐eight out of 143 studies were focusing on this stage. Ten out of those studies 74 , 75 , 76 , 77 , 78 , 79 , 80 , 81 , 82 , 83 were discussing architecture modeling. Twenty‐four studies 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 were discussing architecture analysis. Fourteen studies 77 , 108 , 109 , 110 , 111 , 112 , 113 , 114 , 115 , 116 , 117 , 118 , 119 , 120 were discussing how to make architectural design of systems both safe and secure through modeling and analysis.
Testing also plays a pivotal role in the systems development life cycle. We found three studies focusing on testing in our mapping study. While Sojka et al 121 were explicitly focusing on the testing of safety and security requirements within the automotive domain, Shahir et al 122 , 123 were focusing on test case generation for safety and security of marine systems.
Development stages, such as implementation, 124 , 125 and deployment and reconfiguration, 126 were also mentioned in the literature; however, they were not the center of attention of researchers in this field.
Many studies (30 out of 143) did not focus on any development stage. Instead, they were either comparing safety and security concepts, for example, Burns et al, 127 discussing how one can help achieve the other, for example, Brewer, 128 making similarities and dissimilarities explicit between the two, for example, Blanquart et al, 129 analyzing how the two concepts can cross‐fertilize each other, for example, Pietre et al 130 and so on.
3.2. Methods and tools (RQ2)
Figure 3 graphically depicts the frequency of the applied methods and tools. Some approaches consisted of more than one method/tool. Papers that did not use any method are counted under “None.” Many papers used distinct methods, that is, appearing only in one study. These methods are shown in Figure 3 as “distinct.”
Our research shows that many methods and tools are used in this field, but none stands out. Although there is an observable tendency among the community to use formal methods for such kinds of engineering activities (31 studies are conducted using formal methods), no formal method can be classified as the method of choice. Among more frequently used formal methods, the use of Event‐B 33 , 53 , 56 , 59 , 62 , 68 and Abstract State Machines 76 , 77 , 108 , 122 , 123 has been mentioned in six and five studies, respectively. The use of Alloy 48 , 79 , 112 has been mentioned in three studies. However, all Abstract State Machines and Event‐B method applications stemmed from individual groups and targeted marine and control systems, respectively.
Unified Modeling Language (UML) and its variants, that is, Systems Modeling Language (SysML) and SysML‐Sec, are also relatively popular in this domain and found in 12 studies. The use of UML is mentioned in previous studies. 44 , 66 , 67 , 82 The use of SysML has been mentioned in previous studies. 30 , 39 , 64 The use of SysML‐Sec (an extended version of the SysML language to design safe and secure embedded systems) has been found in previous studies. 17 , 31 , 70 , 71 , 72
The third most widely used set of techniques was STAMP and its variants, that is, STPA, STPA‐Sec, and STPA‐SafeSec (10 studies). Systems‐Theoretic Accident Model and Processes (STAMP) 131 is an accident causality model based on systems theory and systems thinking. Systems‐Theoretic Process Analysis (STPA) 132 is a powerful hazard analysis technique based on STAMP. STPA‐Sec 111 is a system‐theoretic process analysis method explicitly focusing on security issues. STPA‐SafeSec 120 is an analysis methodology for both safety and security. The use of STAMP is mentioned in Troubitsyna et al. 33 The use of STPA is mentioned in previous studies. 52 , 58 , 60 The use of STPA‐Sec is mentioned in previous studies. 110 , 111 , 116 , 117 , 133 The use of STPA‐SafeSec is mentioned in Friedberg et al. 120
Failure analysis is the process of collecting and analyzing data to determine the cause of a possible failure in a system. Failure analysis methods (e.g., FMEA, FMVEA, and FTA) are commonly used to engineer safe and secure systems. Their use has been found in eight studies. The use of Failure Mode and Effects Analysis (FMEA) is mentioned in Hecht et al 64 and Winther et al. 84 The use of Failure Mode, Vulnerabilities, and Effects Analysis (FMVEA)—a variant of FMEA—has been found in previous studies. 89 , 94 , 99 , 101 The use of Fault Tree Analysis (FTA) has been found in Steiner and Liggesmeyer 86 and Kornecki and Liu. 87 An approach very similar to failure analysis is hazard analysis (e.g., HAZOP and CHASSIS). The use of hazard analysis approaches has been found in three studies; however, two were applied in combination with traditional failure analysis methods. The use of Hazard and Operability Study (HAZOP) in combination with FMEA is found in Winther et al 84 and in combination with Combined Harm Assessment of Safety and Security for Information Systems (CHASSIS) has been found in Katta et al. 73 The use of CHASSIS in combination with FMVEA has been found in Schmittner et al. 94 Similarly, Security‐Aware Hazard Analysis and Risk Assessment (SAHARA) and STRIDE (an acronym for six security threat categories: spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privileges.) are hazard analysis and threat modeling approaches. The use of STRIDE is mentioned alone in Preschern et al 85 , 100 and in combination with SAHARA in Macher et al. 92 , 93 The use of SAHARA with FMVEA is mentioned in Dobaj et al. 99
Another approach relatively popular in this domain is based on Goal Structuring Notation (GSN) and safety cases. The use of these notations has been found in seven studies. 34 , 40 , 41 , 85 , 100 , 105 , 117
Goal‐oriented requirements engineering approaches, such as KAOS or NFR, also play an essential role in this domain. Their use has been found in four studies. The use of Knowledge Acquisition in Automated Specification (KAOS)—a goal‐oriented requirements engineering approach—has been found in Ponsard et al. 36 , 51 The use of the Non‐Functional Requirements (NFR) approach—a goal‐oriented technique that can be applied to determine the extent to which specific objectives are achieved by design—has been found in Kornecki et al 46 and Subramanian and Zalewski. 95
Some researchers have also proposed different patterns in this domain, that is, architectural safety patterns including security considerations, 85 , 100 safe & sec case patterns, 50 and systems engineering patterns for interlinking safety and security. 119
The use of Simulink—a graphical programming environment for modeling, simulating, and analyzing multidomain dynamical systems—has been found in three studies. 57 , 103 , 126 Following are the methods whose use has been found in two studies apiece. The use of AltaRica—a high‐level language designed for the modeling of systems—has been mentioned in Bieber and Brunel 47 and Brunel et al. 112 The use of Business Process Model and Notation (BPMN)—a graphical representation for specifying business processes—has been found in Monakova et al. 42 , 43 Finally, the use of MAS has been found in Park et al 22 and Poslad. 26
Many found studies (40) did not employ any method or tool in the conducted research. Instead, they were either characterizing the differences between safety and security, for example, Burns et al. 127 ; comparing the two approaches, for example, Raspotnig et al. 134 ; stressing the need for their integration, for example, Eames et al. 24 ; or demonstrating how they could complement each other, for example, Brewer et al. 128
3.3. Contribution classification (RQ3)
As shown in Figure 4, most researchers of this domain are proposing an approach or a methodology based on an already existing method or tool, that is, 41 out of 143 publications. 26 , 28 , 33 , 34 , 35 , 36 , 40 , 41 , 46 , 47 , 48 , 51 , 52 , 53 , 56 , 58 , 59 , 61 , 62 , 63 , 64 , 65 , 66 , 68 , 71 , 72 , 74 , 78 , 82 , 86 , 87 , 93 , 95 , 97 , 98 , 102 , 114 , 121 , 126 , 135 , 136 Their aim was to adapt an existing technology in such a way that it becomes exploitable for MDE of safety and security systems.
Many researchers were interested in deploying the MDE paradigm for risk‐related activities of safe and secure systems. Twenty‐four out of 143 studies focused on this aspect. While majority of researchers explicitly focused on risk analysis, 79 , 84 , 92 , 94 , 110 , 111 , 112 , 113 , 116 , 117 , 120 , 133 , 137 some also focused on risk assessment, 16 , 73 , 91 , 99 , 101 risk communication, 138 risk management, 90 , 118 and risk modeling. 57
Twenty‐two out of 143 studies had empirical contributions. Taxonomies and ontologies, which provide mappings of how various concerns overlap each other, were found three times. 32 , 135 , 136 Surveys analyzing the challenges and possibilities for a combination of safety and security were found six times. 139 , 140 , 141 , 142 , 143 , 144 The concept papers that propose plans for a future application of a combined safety and security approach were found five times. 145 , 146 , 147 , 148 , 149 The papers comparing safety and security regarding their similarities and differences were found five times. 127 , 128 , 129 , 130 , 134 Two papers evangelize for a unified approach to safety and security. 150 , 151 One contribution compiled a small bibliography. 152
Eighteen out of 143 studies presented a framework that could be useful in various phases of MDE of safety and security systems. A framework, in this context, means a platform providing a foundation for developing safety and security systems. These frameworks were based on either formal approaches, 27 , 45 , 49 , 109 SysML, 30 or other various methods and tools. 19 , 20 , 22 , 67 , 69 , 75 , 81 , 103 , 104 , 107 , 151 , 153 , 154
Thirteen out of 143 studies presented a model. The model could either be related to the collaborative modeling of safety and security properties, 147 a life‐cycle model, 18 , 25 , 124 , 155 a process model, 24 , 37 , 44 , 60 a reference model, 55 or a business process model 42 , 43 , 83 for the development of safety and security systems.
Twelve out of 143 studies presented a language for the MDE of safety and security systems. The proposed languages were either formal languages, 15 , 21 , 38 , 96 , 115 graphical modeling languages, 17 , 31 , 39 , 70 programming languages, 125 architecture description language, 106 or a language for presenting mishaps. 156
Some researchers also presented some decision support systems, 76 , 77 , 108 , 122 , 123 patterns, 50 , 85 , 100 , 105 , 119 and policies 29 , 54 , 80 for the MDE of safe and secure software systems.
3.4. Evaluation domains (RQ4)
Figure 5 graphically depicts the frequency of evaluation domains. Please note that some publications used more than one domain for evaluation purposes. Therefore, the papers belonging to multiple domains are counted multiple times.
FIGURE 5.

RQ4: Studies classification based on evaluation domains
Researchers dealing with safety and security were mostly interested in evaluating their proposed methodologies and tools in the automotive domain. Twenty‐nine 20 , 31 , 35 , 51 , 57 , 58 , 59 , 61 , 63 , 65 , 70 , 82 , 86 , 89 , 92 , 93 , 94 , 103 , 105 , 116 , 117 , 119 , 121 , 141 , 142 , 147 , 148 , 151 , 157 studies were applied to automotive systems. After automotive systems, researchers of this field were mostly interested in applying their methods and tools in control systems. Twenty‐three studies were applied to control systems. Control systems included general‐purpose control systems, 39 , 56 , 62 , 110 , 124 , 143 air traffic control systems, 24 , 44 , 73 , 102 access control systems, 29 , 54 industrial control systems, 30 , 33 , 53 , 80 , 113 , 144 network control systems, 56 electrical substation automation systems, 85 and building automation systems. 25 , 27
After control systems, avionic/aviation systems were most attractive for researchers of this topic. This domain was used as a test bed in 11 studies. 47 , 52 , 67 , 79 , 87 , 106 , 109 , 112 , 133 , 135 , 136
The use of medical systems has been mentioned in eight studies. 75 , 81 , 90 , 98 , 107 , 109 , 137 , 153 At the same time, the railway domain has been featured in seven studies. 32 , 36 , 45 , 55 , 72 , 84 , 140
The use of the marine, pipeline, and power grid systems as an evaluation domain has been mentioned in five studies. The use of marine systems is mentioned in previous studies. 76 , 77 , 108 , 122 , 123 However, an interesting point to note is that all these publications stemmed from a single group applying a particular method: Abstract State Machines. Pipeline systems, on the other hand, were mainly dealing with the oil industry. 46 , 49 , 88 , 95 , 96 The use of power grid systems has been mentioned in previous studies. 69 , 83 , 104 , 120 , 126
Nuclear systems were mentioned in four studies. 37 , 66 , 69 , 91
Business systems have been used as an evaluation domain in three publications. The use of business systems, mainly enterprise resource planning systems, has been mentioned in previous studies. 38 , 42 , 43
Satellite and defense systems have been used as an evaluation domain in two publications each. The use of satellite systems is mentioned in Johnson and Yepez. 40 , 41 The use of defense systems is mentioned in Cockram and Lautieri 74 and Cimatti et al. 115
The use of fire detection, 48 rescue, 22 road transportation, 114 smart card, 19 smart cities, 146 virtual organization, 26 water supply, 64 smart home, 21 and voting 60 systems has been mentioned only once in the found literature.
As aforementioned in Section 3.2, many found studies did not employ any particular method or tool in their research. Instead, these studies were either characterizing the differences between safety and security or stressing the need for their integration. Naturally, such comparative or road‐map studies were not always subject to evaluation. Consequently, many studies (31) we found were not evaluated on any particular domain.
3.5. Publication types and venues (RQ5)
3.5.1. Publication types (RQ5a)
Only peer‐reviewed publications (including books, journals, magazines, conferences, and workshops) were considered in this study. Please note that we did not consider books containing contributions by multiple authors. Such contributions are treated as independent studies. Figure 6A provides an overview of the distribution of studies between these venues. An overwhelming majority of studies (99/143) were published in conferences, followed by journals and workshops.
FIGURE 6.

RQ5: Studies classification based on publication types and venues
3.5.2. Publication venues (RQ5b)
Looking at mapping study results, it was clear which venues were mostly targeted by researchers of this domain. The top 4 venues for this domain are shown in Figure 6B. The most favorite venue of researchers of this topic is undoubtedly the Conference on Computer Safety, Reliability, and Security (SAFECOMP). Twenty‐seven studies 24 , 33 , 47 , 48 , 50 , 51 , 52 , 56 , 68 , 81 , 84 , 88 , 89 , 90 , 92 , 93 , 99 , 101 , 103 , 115 , 116 , 117 , 119 , 138 , 141 , 151 , 157 are published on this venue. Conference on Intelligence and Security Informatics (ISI), 77 , 108 , 122 Proceedings of the IEEE, 109 , 126 , 149 and Journal on Reliability Engineering & Systems Safety 130 , 144 , 154 contained three publications each. Conference on Critical Information Infrastructures Security (CRITIS), 80 , 139 Journal on Security Informatics, 22 , 123 Conference on Emerging Technologies and Factory Automation (ETFA), 25 , 143 European Dependable Computing Conference (EDCC), 57 , 59 Symposium on Model‐Based Safety and Assessment (IMBSA), 62 , 142 Workshop on Interplay of Security, Safety and System/Software Architecture (ISSA), 18 , 71 and Workshop on Software Engineering for Resilient Systems (SERENE) 16 , 53 hosted two papers apiece. All other venues had only one publication each.
3.6. Publication timeline and trend (RQ6)
Figure 7 shows the timeline and trend of publications in this area. As per our findings, the first study 127 explicitly focusing on safety and security together was published in 1992. While the interest in this area was linear until 2006, a significant increase can be observed from 2007 onwards, reaching its top in 2015. Since then, like a typical hype cycle, the community is perhaps slowly climbing the “slope of enlightenment” towards the “plateau of productivity.” Nonetheless, the increase in the number of publications indicates that the area is considered highly relevant by the software engineering research community.
FIGURE 7.

RQ6: Studies classification based on publication timeline and trend
4. DISCUSSION AND INSIGHTS
Regarding RQ1, we have found that most researchers are working at the level of requirements or architecture. Modeling and analysis activities are the primary focus at both these levels. Only a few researchers consider the whole MDE spectrum (i.e., all development life‐cycle activities). While modeling and analysis of requirements and designs are essential activities, it is also imperative to ensure that these models are eventually translated into implementations as seamlessly as possible. Detailed works showing such transformations are currently missing from the state of the art and worth exploring in the future. Another critical point we observed is that testing is not a primary focus of researchers in this field. Although the code generated through a rigorous development process is, in principle, already verified and validated, this is not enough in the case of critical systems. For such systems, the generated code also needs to be tested. 158 In our opinion, researchers in this field should give priority to testing as it uncovers different sets of problems than those found in earlier stages of development, for example, if the code is later manually modified to introduce further implementation details, the designer can use tests to check that no faults are introduced inadvertently. Other development stages, though important, like planning, implementation, and deployment, are also currently underrepresented. There is much room for applying model‐driven approaches in these areas to engineer safe and secure software systems.
Regarding RQ2, we have found out that no single method or tool is prevalent in this domain. Although formal approaches are common (which makes perfect sense given the critical nature of safety and security systems), no formal method stands out. Formal methods, such as Abstract State Machines or Event‐B, have been used to design and develop many systems. However, the use of these methods often stems from individual groups. The STAMP method—initially proposed for the safety domain—also looks promising in this field. Several STAMP variants have recently been proposed to extend its capability toward security systems. However, it needs to be applied to more domains and projects before its suitability for safety and security systems can be truly evaluated. Additionally, the current use of this method is also confined to modeling and analysis of requirements and design artifacts. In the future, applying this method (by extension) to other stages of development could be an exciting topic of research. Finally, the use of graphical modeling languages, such as UML or SysML, is lacking in this field; even the available work mainly concentrates on modeling and analysis of requirements. Given the potential of these languages, this could be a niche for further research to demonstrate their effectiveness through their widespread applications to safety and security systems.
Regarding RQ3, we have found out that most researchers were interested in the risk analysis of such systems. Risk analysis is a crucial activity in the domain of safety. This becomes even more crucial when safety is integrated with security. Various methods were used for risk analysis, and mostly, researchers worked at the architecture and design level. While hazard analysis (e.g., HAZOP) and failure analysis (e.g., FMEA or FTA) are already established methods for risk analysis, new approaches, such as FMVEA, STPA‐SafeSec, or SAHARA, are also emerging recently. Working towards maturity and improving these approaches by further application to new domains and projects is also an exciting research topic. Another interesting observation we made was that most researchers are extending the capabilities of existing methods and tools to solve the challenges of this field (e.g., FMVEA is based on well‐established FMEA or STPA‐SafeSec is based on popular STPA) rather than presenting new frameworks and languages. Of course, new pertinent frameworks (e.g., SAFESCALE 75 ) or languages (e.g., FADES 15 ) are also surfacing but relatively low in number. A few contributions were made in laying out the basic theoretic foundations of the field, including aligning methods for safety and security.
In Figure 8, we show the focus points of the selected studies. On the vertical axis, there are categories of RQ2, that is, deployed methods and tools. On the horizontal axis, categories of RQ3 are used, that is, contribution types. Like in RQ2, entries can appear multiple times as one study can use numerous methods and tools, for example, as shown in the “patterns” column. Here, while the contribution type of studies is a pattern, they also used GSN and Stride methods. Nonetheless, what can be seen in Figure 8 is that formal methods got much attention in various areas. Most attention was given to finding an approach for realizing a system. This is not unsurprising as formal methods are already well established and well supported in the safety‐critical systems community. UML and its variants got second‐most attention, which is unsurprising, too, as this approach offers much flexibility. Other than that, most crossing points are barely or not populated, showing possible future research avenues.
FIGURE 8.

Overlapping between contribution types and their employed methods
Regarding RQ4, we have found out that most researchers used the automotive domain to evaluate their results. This is consistent with the emerging phenomenon of autonomous driving, where both safety and security play equally critical roles. However, the prominence of research in MDE for the automotive domain predates autonomous driving and has more to do with the adoption of this paradigm by the automotive industry. 159 Control systems were also a favorite testbed for the evaluation of such systems. We believe two domains—medical and railway—are underrepresented in the current state of the art and should be further considered by the researchers in the future. Since medical systems have started becoming interoperable, 160 cybersecurity has become an essential issue for these safety‐critical systems. Additionally, none of the found studies related to the medical domain focused on the requirements stage. This is an auspicious future research direction. Likewise, in the domain of railway, the advanced level of hybridness also necessitates the consideration of cybersecurity aspects. 161 We will, therefore, most likely see catchup here when the technologies like ETCS Level 3 162 are more and more adapted.
In Figure 9, we show how development stages and tool usage is distributed over the evaluation domains. Here, the planning stage has been included for completion even though it has no entry. The study related to the planning stage was evaluating rescue systems, which are not shown in Figure 9 due to the low frequency. The same goes for the label MAS. As already pointed out in RQ4, the automotive domain got much attention in the well‐populated requirements and architecture and design stages. However, the automotive row is evenly distributed when using methods and tools. Control systems got much attention in the formal methods category, which is not unsurprising. However, surprising is that the studies in the medical domain were conducted at the architecture stage (there are a total number of eight studies related to the medical domain. Six of those studies were conducted at the architecture stage, while two of them did not belong to any stage) and none of them with tools that are significant in number otherwise. The studies in the railway domain focus on requirements, but the employed methods and tools are spread out.
FIGURE 9.

Overlapping between evaluation domains, development stages, and employed methods and tools
Regarding RQ5, we found that most researchers preferred to publish their results in conferences, especially in SAFECOMP. Articles appearing in journals were less in number and distributed among different venues. The numbers indicate that this research field is still (relatively) young and evolving. Also, more books must be published in this field to advance industrial maturity and adoption.
Regarding RQ6, we have found out that the community's interest is increasing in this research field. Moreover, more and more publications have explicitly focused on the MDE of safe and secure systems in the past few years. This temporal evolution is indeed suitable for its maturity and industrial uptake.
We have observed in our research that a significant number of publications did not mention any development stage, method, or evaluation domain in their results. This is mainly because these publications stressed the need for the joint modeling and development of safety and security by comparing the two concepts, discussing how one can help achieve the other, or analyzing how the two concepts can cross‐fertilize each other. So, naturally, such conceptual and road‐map studies were not subject to classification in respective RQs. Additionally, this large number of unclassified publications suggests the novelty of this field, that is, still much evangelizing is happening in this area.
5. FUTURE RESEARCH DIRECTIONS
Although we have given several hints in the preceding section, we would like to explicitly mention four areas where further research is required in this area. These hints are relatively broad as we think they offer promising ground‐laying future research direction. What we do not want to do is point out holes in the research we spotted in our analysis, like, for example, that there is no application of BPMN in the medical field, which one can see in Figure 9. This is because not every blank space is a promising research field. Reusing our example, BPMN is a business modeling technique, and its application in the medical domain that is highly safety‐critical might not even be feasible. Therefore, we concentrate on the bigger picture and point out the more prominent blank spots that might be interesting for a researcher to investigate.
5.1. Development of standards
The development of both safety and security systems is driven by standards today. Standards like IEC 61508 or ISO 26262 and ISO/IEC 27000 are already popular in safety and security domains, respectively. However, these standards do not offer any (concrete) technical advice on combined deployable processes and product qualities related to safety and security, even though they have a common origin in ISO 31000 regarding risk management. Furthermore, no integrated standard exists that addresses safety and security issues concurrently—especially the possible challenges emerging through their interplay; however, currently, two are under development to provide a bridge between both areas as described by Kanamaru. 155 Further, the International Society for Automation (ISA) has formed a working group (Work Group 7 on cybersecurity and safety in industrial processes 163 ) to investigate the potential coupling between safety and security. Nevertheless, as documented in the preliminary report, 163 the group could not find a mathematical coupling between Safety Integrity Levels (SIL) and Security Levels (SL) due to the technical difference between the SIL and the SL calculation methods. Indeed, further efforts are required in this direction.
5.2. Cross‐fertilization among methods and tools
We have seen that formal approaches are among the frequently used methods and tools in this area. Indeed, state‐based formal methods 164 seem to be quite suitable for the engineering of such kinds of systems: They cover all stages of the development life cycle, a variety of modeling and analysis tools are available at the disposal of developers, quality assurance is embedded within the development process, there is support for translation of requirements and design artifacts into correct pieces of software, and so on. The catch is that state‐based formal models may be opaque, that is, hard to read and write for many stakeholders. 165 , 166 Such developments can be augmented by using graphical modeling notations such as UML or SysML. This provides cross‐fertilization among various modeling tools and enables developers to harness the true potential of each tool at the suitable development stage. Some tools (e.g., UML‐B 167 ) and approaches (e.g., KAOS‐Event‐B 168 ) already exist and worth exploring in this regard. As far as risk analysis is concerned, which generally does not fall within the jurisdiction of formal methods, further research is required towards its harmonization with formal methods, such as shown by Khan et al. 169 Another problem with state‐based formal methods is that while they offer practical tools for verification and validation, the support for automatic code generation is far from desirable. 170 These methods can, in principle, generate code artifacts from models; however, the generated code needs much manual postprocessing. This may introduce some inconsistencies or errors in code, which may, in turn, compromise the integrity of the previously applied rigorous quality assurance process. This also makes systems susceptible to extensive testing, which is already a weak link in the development chain of such systems. Hence, future methods for MDE of safety and security systems need to offer better tools and methodologies, especially for code generation and testing, respectively. Looking from the security perspective, the STAMP method and its offshoots—being integrated approaches for safety and security—go beyond the risks mitigated by using formal methods, for example, human errors are also considered. The same is true for failure analysis. The approaches like FMEA aim to unify safety and security risk analysis. A unified analysis can ease the effort for the whole MDE process as, otherwise, multiple approaches for capturing safety and security may produce overlapping or contrary results.
5.3. Leveraging machine learning
We have observed a limited, relatively nonexistent use of machine learning in MDE of safety and security systems while conducting this study. However, because various machine learning techniques have been successfully deployed for system safety and security through machine vision and digital image processing, we believe the MDE community can also benefit from this. The power of machine learning combined with the agility of MDE can undoubtedly facilitate the development of safety and security software systems.
5.4. Further application domains
As shown previously, most researchers focused on automotive systems to evaluate their results, followed by control systems. We believe several other domains, such as the medical and railway sectors, deserve equal attention, currently underrepresented. Primarily, none of the studies related to the medical domain focused on the requirements stage. This is an auspicious future research direction. Security is lately also becoming an essential phenomenon in these traditional safety‐critical domains, and there is a huge potential for experimentation and advancing the state of the art. Another futuristic domain consists of smart systems such as smart grids and smart cities. For security as a stand‐alone topic, there are already very high‐level standards in use, for example, the NIS Directive of the European Union Agency for Cybersecurity. §§ This standard aims to harmonize the cybersecurity solutions of the members and enhance cross‐border collaboration in this field. The standard is used for critical infrastructures like banking, water supply, health, energy, and digital services. In addition, there is a scope for its extension to further domains such as railways and automotive.
6. THREATS TO VALIDITY
There is always a threat of validity for such kinds of empirical studies. We also face several threats in our systematic mapping process, which we discuss as follows. The categorization is taken from Zhou et al. 171
6.1. Internal validity
As found by Petersen et al, 9 quality assessment is not common in mapping studies. This is also consistent with suggestions of Kitchenham et al, 8 which state that quality assessment is not essential for mapping studies as their overall aim is to give a broad overview of the topic area. However, despite these observations, we have adopted a rigorous process for inclusion/exclusion and classification of papers, which ensures that only high‐quality‐related papers are selected as primary studies. Another internal validity threat is regarding the source of the data. We used five digital libraries as a primary source for this research. All selected digital libraries are well known in the computer science discipline for including the most relevant results. 172 Additionally, Wohlin et al 173 state that having a more extensive set of papers is not necessarily better for mapping studies. The important thing is that found studies are a good representation of the population, which we ensured in this study by adopting a rigorous paper selection process.
6.2. Construct validity
The RQs themselves can be a threat: Are they the right kind of questions we should be asking? To minimize this threat, we judiciously crafted the questions in alignment with the overall aim of this work after having several internal discussions. The final set of RQs reflects our work's goals of providing an overview of this field's current state‐of‐the‐art and future research directions. Another threat to the integrity of the study is related to the terms used in search queries. To minimize this threat, we adopted the PICO criteria 13 to formulate the search terms. The selected terms unequivocally represent the goals of our work. We discovered many publications during snowballing because we employed an extensive snowballing process, including backward and forward snowballing. However, many found studies in snowballing are not flawed as the possibility of noise in snowballing is less than using a digital library approach. 14 An associated issue is the frequently used acronyms for model‐based/driven engineering. Although the query used did not explicitly include related acronyms, such as MDE, model‐driven development (MDD), or MBSE, this would not result in missing relevant articles because such information is usually available (or redundant) in meta‐data, for example, keywords or index terms, hence accessible.
6.3. Conclusion validity
As gray literature was ruled out from the beginning of the study, the results can be biased, especially regarding the implementation and application aspect of MDE for safety and security. We see, however, difficulties with including gray literature as the process of its selection is highly biased. First, as these types of publications are not listed in databases, a specific search must be conducted where vital results might not be found, leading to a false representation of reality. Second, companies tend to only publish success stories due to their market interest. This could also heavily bias the results of the study. We aim to provide a map of research progress, showing which areas are already investigated and which are not. Software success stories would populate certain areas while leaving those out where companies were unsuccessful and distort how the research areas are indeed populated.
7. RELATED WORK
Some authors have already presented initial findings on the available literature about safety and security systems. For example, Chockalingam et al 139 present a survey on integrated safety and security risk assessments methods and their application domains. Abulamddi 174 additionally caters to extracting requirements from the found risks. However, these works are limited to risk assessment and requirement extraction, just one aspect of our broader study. Piètre‐Cambacédès and Bouissou 130 provide a survey on similarities and differences between safety and security approaches, including their interplay. The authors identify cross‐fertilization between the two areas and how the method from one area can be utilized in the other. A very narrow view of this cross‐fertilization is discussed within the industrial control applications in the work of Kriaa et al. 144 Another work on cross‐fertilization, focusing on common standards and approaches to deeper entangle safety and security, is from Ponsard et al. 175 In contrast to these works, our study focuses on the MDE of safety and security systems, what are the proposed methods and tools for each development stage, and what are various types of contributions in this regard.
A recently conducted systematic literature review on safety and security co‐analyses is presented by Lisova et al. 176 In contrast to our study, (1) this work is only focusing on the requirements engineering stage, (2) this work focuses on a short span of publication timeline between 2012 and 2017, and (3) a smaller number of digital libraries are consulted in this study, hence a relatively limited set of papers available for analysis. Additionally, the nature of the RQs we are answering in our study is much broader and covers a broader spectrum of the area. Finally, as aforementioned, the nature of systematic literature reviews and systematic mapping studies are fundamentally different.
8. CONCLUSION
This article presents a systematic mapping study on MDE of safety and security software systems. Our mapping study provides an overview of the current state of the art in this field. Through a rigorous and systematic process, this study carefully selected 143 publications out of 27,259 relevant search results, which proved very helpful in answering the judiciously crafted RQs like the frequently used methods and tools, the important life‐cycle development stages, and the frequently used evaluation domains. Additionally, we identified the community's preference for publication venues and publication trends. Finally, based on the analysis of selected studies, we indicated several avenues for future research.
The current state of the art provides practical support for modeling and analysis of requirements and design of safety and security software systems. However, the state of the art needs to be advanced to offer better tools and methodologies, especially for code generation and testing. Better integration of graphical modeling languages with conventional formal notations and harmonizing rigorous methods and risk analysis approaches will also help. We also welcome more studies encapsulating the whole spectrum of MDE applied to safety and security systems, significantly leveraging machine learning approaches. Standards specific to the interplay between safety and security are also missing and need to be focused on soon.
In the future, we want to extend this study by asking qualitative questions like what the maturity level of the presented contribution is, how useful it is for the given task, which impetuses are required as input, and whether the contribution is applicable at the design time (static) or at the run time (dynamic). Regarding the MDE approach, it would be helpful to know the substantial aspects of developing safe and secure systems and the best way to apply MDE in the development. Analogously, machine learning, which we identified as a future research aspect, offers an opportunity for deeper investigation and research. Questions might be how machine learning influences the MDE aspect or helps develop safe and secure software systems. As assessing safety and security threads is a complex task, it might be worth considering them as multiple‐criteria problems. A modeler can tackle these problems with multiple‐criteria decision‐making (MCDM) techniques like, for example, MEW 177 where multiple criteria might conflict with each other. A modeler can then decide trade‐offs with the help of fuzzy mathematics. However, it might be worth discussing how relevant this is for the safety‐security domain. The finished product needs to fulfill standards for both aspects to get clearance for operating the device. This might be a venture for further investigation.
ACKNOWLEDGMENTS
The research reported in this paper has been partly funded by the Austrian Science Fund (FWF) in the framework of the IVOIRE project (I 4744‐N) and the LIT Secure and Correct Systems Lab sponsored by the province of Upper Austria.
1.
TABLE A1.
Classification map
| # | Publication | Development stage | Method/tool | Contribution type | Evaluation domain | Publication type | Year |
|---|---|---|---|---|---|---|---|
| 1 | 127 | None | None | Assorted | None | Journal | 1992 |
| 2 | 128 | None | None | Assorted | None | Conference | 1993 |
| 3 | 23 | Requirements | None | Assorted | None | Conference | 1995 |
| 4 | 24 | Requirements | None | Model | None | Conference | 1999 |
| 5 | 84 | Design | HAZOP‐FMEA | Risk analysis | Railway system | Conference | 2001 |
| 6 | 156 | None | Mishaps | Language | None | Journal | 2006 |
| 7 | 154 | None | None | Framework | None | Journal | 2007 |
| 8 | 74 | Design | SafSec | Approach | Defense system | Conference | 2007 |
| 9 | 25 | Requirements | None | Model | Automation system | Conference | 2007 |
| 10 | 145 | None | None | Assorted | None | Conference | 2009 |
| 11 | 143 | None | None | Assorted | Control system | Conference | 2009 |
| 12 | 26 | Requirements | MAS | Approach | Virtual organization | Conference | 2009 |
| 13 | 27 | Requirements | Formal methods | Framework | Automation system | Workshop | 2009 |
| 14 | 75 | Design | SAFESCALE | Framework | Medical system | Conference | 2009 |
| 15 | 38 | Requirements | HRU | Language | Business system | Conference | 2010 |
| 16 | 76 | Design | ASMs | Decision support | Marine system | Conference | 2010 |
| 17 | 77 | Design | ASMs | Decision support | Marine system | Conference | 2010 |
| 18 | 15 | All | FADES | Language | None | Workshop | 2010 |
| 19 | 28 | Requirements | BDMP | Approach | None | Conference | 2010 |
| 20 | 69 | Requirements | SEMA | Framework | Power grid/Nuclear | Journal | 2010 |
| 21 | 29 | Requirements | HRU | Policy | Control system | Conference | 2011 |
| 22 | 108 | Design | ASMs | Decision support | Marine system | Conference | 2011 |
| 23 | 40 | Requirements | Safety cases | Approach | Satellite system | Conference | 2011 |
| 24 | 41 | Requirements | Safety cases | Approach | Satellite system | Conference | 2011 |
| 25 | 39 | Requirements | SysML | Language | Control system | Conference | 2011 |
| 26 | 122 | Testing | ASMs | Decision support | Marine system | Conference | 2011 |
| 27 | 78 | Design | Markov model | Approach | None | Conference | 2011 |
| 28 | 109 | Design | Formal methods | Framework | Medical/Avionics | Journal | 2012 |
| 29 | 129 | None | None | Assorted | None | Conference | 2012 |
| 30 | 45 | Requirements | LTL | Framework | Railways system | Journal | 2012 |
| 31 | 124 | Implementation | None | Model | Control system | Book | 2012 |
| 32 | 42 | Requirements | BPMN | Model | Business system | Conference | 2012 |
| 33 | 43 | Requirements | BPMN | Model | Business system | Conference | 2012 |
| 34 | 22 | Planning | MAS | Framework | Rescue system | Journal | 2012 |
| 35 | 44 | Requirements | UML | Model | Control system | Conference | 2012 |
| 36 | 123 | Testing | ASMs | Decision support | Marine system | Journal | 2012 |
| 37 | 16 | All | Safety cases | Risk analysis | None | Workshop | 2013 |
| 38 | 73 | Requirements | HAZOP/CHASSIS | Risk analysis | Control system | Conference | 2013 |
| 39 | 87 | Design | FTA | Approach | Aviation system | Journal | 2013 |
| 40 | 46 | Requirements | NFR | Approach | Pipelines system | Conference | 2013 |
| 41 | 30 | Requirements | SysML | Framework | Control system | Conference | 2013 |
| 42 | 130 | None | None | Assorted | None | Journal | 2013 |
| 43 | 85 | Design | STRIDE/Patterns | Pattern | Automation system | Conference | 2013 |
| 44 | 134 | None | None | Assorted | None | Journal | 2013 |
| 45 | 86 | Design | FTA | Approach | Automotive system | Conference | 2013 |
| 46 | 110 | Design | STPA‐Sec | Risk analysis | Control system | Conference | 2013 |
| 47 | 47 | Requirements | AltaRica | Approach | Avionics system | Conference | 2014 |
| 48 | 79 | Design | AltaRica/Alloy | Risk analysis | Avionic system | Workshop | 2014 |
| 49 | 112 | Design | Alloy | Risk analysis | Avionic system | Workshop | 2014 |
| 50 | 91 | Design | USSRAM | Risk analysis | Nuclear system | Conference | 2014 |
| 51 | 146 | None | None | Assorted | Smart cities | Journal | 2014 |
| 52 | 138 | None | None | Risk analysis | Automation system | Conference | 2014 |
| 53 | 88 | Design | BDMP | Risk analysis | Pipeline system | Conference | 2014 |
| 54 | 135 | None | None | Approach | Avionics | Conference | 2014 |
| 55 | 147 | None | None | Model | Automotive system | Journal | 2014 |
| 56 | 89 | Design | FMVEA | Risk analysis | Automotive system | Conference | 2014 |
| 57 | 121 | Testing | AUTOSAR | Approach | Automotive system | Conference | 2014 |
| 58 | 90 | Design | None | Risk analysis | Medical system | Conference | 2014 |
| 59 | 111 | Design | STPA‐Sec | Risk analysis | Medical system | Magazine | 2014 |
| 60 | 31 | Requirements | SysML‐Sec | Language | Automotive system | Conference | 2015 |
| 61 | 136 | None | COM | Approach | Aviation | Conference | 2015 |
| 62 | 48 | Requirements | Alloy | Approach | Fire detection system | Conference | 2015 |
| 63 | 114 | Design | EAST‐ADL | Approach | Road transport system | Conference | 2015 |
| 64 | 115 | Design | OCRA | Language | Defense system | Conference | 2015 |
| 65 | 32 | Requirements | None | Assorted | Railway system | Journal | 2015 |
| 66 | 113 | Design | S‐Cube | Risk analysis | Control system | Journal | 2015 |
| 67 | 144 | None | None | Assorted | Control system | Journal | 2015 |
| 68 | 49 | Design | Formal methods | Framework | Pipeline system | Conference | 2015 |
| 69 | 92 | Design | STRIDE/SAHARA | Risk analysis | Automotive system | Conference | 2015 |
| 70 | 93 | Design | STRIDE/SAHARA | Risk analysis | Automotive system | Conference | 2015 |
| 71 | 152 | None | None | Assorted | None | Journal | 2015 |
| 72 | 70 | Requirements | SysML‐Sec | Language | Automotive system | Conference | 2015 |
| 73 | 150 | None | None | Assorted | None | Conference | 2015 |
| 74 | 151 | None | None | Framework | Automotive system | Conference | 2015 |
| 75 | 94 | Design | FMVEA‐CHASSIS | Risk analysis | Automotive system | workshop | 2015 |
| 76 | 50 | Requirements | Patterns | Pattern | None | Conference | 2015 |
| 77 | 153 | None | None | Framework | Medical | Conference | 2015 |
| 78 | 17 | All | SysML‐Sec | Language | None | Conference | 2016 |
| 79 | 19 | All | None | Framework | Smart card system | Conference | 2016 |
| 80 | 51 | Requirements | KAOS | Approach | Automotive system | Conference | 2016 |
| 81 | 116 | Design | STPA‐Sec | Risk analysis | Automotive system | Conference | 2016 |
| 82 | 148 | None | None | Assorted | Automotive system | Conference | 2016 |
| 83 | 95 | Design | NFR | Approach | Pipeline system | Journal | 2016 |
| 84 | 34 | Requirements | STAMP/Safety cases | Approach | None | Conference | 2016 |
| 85 | 33 | Requirements | Event‐B | Approach | Control system | Conference | 2016 |
| 86 | 80 | Design | LTL/CFG | Policy | Control system | Conference | 2016 |
| 87 | 137 | Design | LTL/CFG | Policy | Control system | Conference | 2016 |
| 88 | 119 | Design | Patterns | Pattern | Automotive system | Conference | 2017 |
| 89 | 54 | Requirements | HRU | Policy | Control system | Conference | 2017 |
| 90 | 35 | Requirements | None | Approach | Automotive system | Conference | 2017 |
| 91 | 139 | None | None | Assorted | None | Conference | 2017 |
| 92 | 120 | Design | STPA‐SafeSec | Risk analysis | Power grid | Journal | 2017 |
| 93 | 118 | Design | PEARS | Risk analysis | None | Journal | 2017 |
| 94 | 155 | None | None | Model | None | Conference | 2017 |
| 95 | 96 | Design | AFT | Language | Pipeline system | Conference | 2017 |
| 96 | 117 | Design | STPA‐Sec | Risk analysis | Automotive system | Conference | 2017 |
| 97 | 140 | None | None | Assorted | Railway system | Conference | 2017 |
| 98 | 52 | Requirements | STPA | Approach | Avionics system | Conference | 2017 |
| 99 | 53 | Requirements | Event‐B | Approach | Control system | Workshop | 2017 |
| 100 | 149 | None | None | Assorted | None | Journal | 2017 |
| 101 | 125 | Implementation | C | Language | None | Conference | 2018 |
| 102 | 178 | None | None | Assorted | None | Conference | 2018 |
| 103 | 179 | None | None | Assorted | None | Magazine | 2018 |
| 104 | 141 | None | None | Assorted | Automotive system | Conference | 2018 |
| 105 | 55 | Requirements | SSIRM | Model | Railway system | Conference | 2018 |
| 106 | 36 | Requirements | KAOS | Approach | Railway system | Workshop | 2018 |
| 107 | 58 | Requirements | STPA | Approach | Automotive system | Journal | 2018 |
| 108 | 57 | Requirements | Simulink | Risk analysis | Automotive system | Conference | 2018 |
| 109 | 157 | None | None | Assorted | Automotive system | Conference | 2018 |
| 110 | 97 | Design | None | Approach | Control system | Journal | 2018 |
| 111 | 126 | Deployment | Simulink | Approach | Power grid | Journal | 2018 |
| 112 | 56 | Requirements | Event‐B | Approach | Control system | Conference | 2018 |
| 113 | 59 | Requirements | Event‐B | Approach | Automotive system | Conference | 2018 |
| 114 | 98 | Design | None | Approach | Medical system | Conference | 2018 |
| 115 | 71 | Requirements | SysML‐Sec | Approach | None | Workshop | 2019 |
| 116 | 60 | Requirements | STPA | Model | Voting system | Conference | 2019 |
| 117 | 99 | Design | SAHARA/FMVEA | Risk analysis | None | Conference | 2019 |
| 118 | 102 | Design | Formal methods | Approach | Control system | Conference | 2019 |
| 119 | 61 | Requirements | UPPAAL | Approach | Automotive system | Conference | 2019 |
| 120 | 81 | Design | SSAF | Framework | Medical system | Conference | 2019 |
| 121 | 142 | None | None | Assorted | Automotive system | Conference | 2019 |
| 122 | 37 | Requirements | HLIM | Model | Nuclear system | Conference | 2019 |
| 123 | 18 | All | None | Model | None | Workshop | 2019 |
| 124 | 133 | Design | STPA‐Sec | Risk analysis | Aviation system | Journal | 2019 |
| 125 | 100 | Design | STRIDE/Patterns | Pattern | None | Journal | 2019 |
| 126 | 20 | All | AVES | Framework | Automotive system | Conference | 2019 |
| 127 | 101 | Design | FTA/FMVEA | Risk analysis | None | Conference | 2019 |
| 128 | 62 | Requirements | Event‐B | Approach | Control system | Conference | 2019 |
| 129 | 82 | Design | UML | Approach | Automotive | Conference | 2019 |
| 130 | 63 | Requirements | Common criteria | Approach | Automotive system | Workshop | 2020 |
| 131 | 103 | Design | Simulink | Framework | Automotive system | Workshop | 2020 |
| 132 | 64 | Requirements | SysML/FMEA | Approach | Water supply system | Conference | 2020 |
| 133 | 65 | Requirements | STORM | Approach | Automotive system | Conference | 2020 |
| 134 | 104 | Design | UPPAAL | Framework | Power grid system | Conference | 2020 |
| 135 | 105 | Design | GSN | Pattern | Automotive system | Journal | 2020 |
| 136 | 66 | Requirements | UML | Approach | Nuclear system | Conference | 2020 |
| 137 | 67 | Requirements | UML | Framework | Avionic system | Conference | 2020 |
| 138 | 68 | Requirements | Event‐B | Approach | Control system | Workshop | 2020 |
| 139 | 106 | Design | AADL | Language | Aviation system | Magazine | 2020 |
| 140 | 107 | Design | PRF | Framework | Medical system | Conference | 2020 |
| 141 | 83 | Design | None | Model | Power grid system | Conference | 2020 |
| 142 | 21 | All | Lustre | Language | Smart home system | Conference | 2020 |
| 143 | 72 | Requirements | SysML‐Sec | Approach | Railway system | Conference | 2020 |
Mashkoor A, Egyed A, Wille R, Stock S. Model‐driven engineering of safety and security software systems: A systematic mapping study and future research directions. J Softw Evol Proc. 2023;35(7):e2457. doi: 10.1002/smr.2457
Footnotes
DATA AVAILABILITY STATEMENT
The data that support the findings of this study are openly available in Zenodo at https://doi.org/10.5281/zenodo.5785657.
REFERENCES
- 1. International Electrotechnical Commission . IEC 61508‐3 Ed 2.0—Functional safety of electrical/electronic/programmable electronic safety‐related systems. Standard, International Electrotechnical Commission; 2010.
- 2. International Electrotechnical Commission . IEC 62443‐3‐3:2013(E)—Industrial communication networks network and system security. Standard, International Electrotechnical Commission; 2009.
- 3. Mashkoor A, Sametinger J, Biro M, Egyed A. Security‐ and safety‐critical cyber‐physical systems. J Softw: Evol Process. 2020;32(2):1‐2. 10.1002/smr.2239 [DOI] [Google Scholar]
- 4. Biró M, Mashkoor A, Sametinger J. Safe and secure cyber‐physical systems. J Softw: Evol Process. 2021;33(9):e2340. 10.1002/smr.2340 [DOI] [Google Scholar]
- 5. Wolf M, Serpanos D. Safety and security in cyber‐physical systems and internet‐of‐things systems. Proc IEEE. 2018;106(1):9‐20. [Google Scholar]
- 6. Schmidt DC. Model‐driven engineering. IEEE Comput. 2006;39(2):25‐31. [Google Scholar]
- 7. Petersen K, Feldt R, Mujtaba S, Mattsson M. Systematic mapping studies in software engineering. In: EASE, EASE'08. ACM; 2008:68‐77. [Google Scholar]
- 8. Kitchenham BA, Budgen D, Brereton OP. The value of mapping studies—a participant‐observer case study. In: EASE, EASE'10. ACM; 2010:25‐33. http://dl.acm.org/citation.cfm?id=2227057.2227074 [Google Scholar]
- 9. Petersen K, Vakkalanka S, Kuzniarz L. Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol. 2015;64:1‐18. [Google Scholar]
- 10. Wieringa R, Maiden N, Mead N, Rolland C. Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requir Eng. 2005;11(1):102‐107. 10.1007/s00766-005-0021-6 [DOI] [Google Scholar]
- 11. Chen L, Babar MA, Zhang H. Towards an evidence‐based understanding of electronic data sources. In: Proceedings of the 14th International Conference on Evaluation and Assessment in Software Engineering, EASE'10. ScienceOpen; 2010:135‐138. http://dl.acm.org/citation.cfm?id=2227057.2227074
- 12. Ahmed KM, Al Dhubaib B. Zotero: a bibliographic assistant to researcher. J Pharmacol Pharmacother. 2011;2(4):303‐305. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13. Kitchenham B, Charters S. Guidelines for performing systematic literature reviews in software engineering. 2007. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.117.471&rep=rep1&type=pdf
- 14. Wohlin C. Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, EASE'14. ACM; 2014:1‐10.
- 15. Hassan R, Bohner S, Eltoweissy M. Towards safe and productive development of secure software: FADES and model‐based software engineering. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research. ACM; 2010:1‐4.
- 16. Bloomfield R, Netkachova K, Stroud R. Security‐informed safety: If it's not secure, it's not safe. In: International Workshop on Software Engineering for Resilient Systems. Springer; 2013.
- 17. Apvrille L, Li L, Roudier Y. Model‐driven engineering for designing safe and secure embedded systems. In: 2016 Architecture‐Centric Virtual Integration (ACVI). IEEE; 2016:4‐7.
- 18. Pedroza G. Towards safety and security co‐engineering. In: Security and Safety Interplay of Intelligent Software Systems. Springer; 2019:3‐16.
- 19. Benyó B, Sódor B, Vilmos A, Kovács K, Fördős G. Safe and secure implementation of the global platform conform infrastructure supporting the customer centric model based ecosystem. In: 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES). IEEE; 2016:131‐140.
- 20. Sabaliauskaite G, Liew LS, Zhou F. AVES—automated vehicle safety and security analysis framework. In: ACM Computer Science in Cars Symposium. ACM; 2019:1‐8.
- 21. Tang W, Feng H, Hisazumi K, Fukuda A. A verification method for security and safety of IoT applications through DSM language and lustre. In: Proceedings of the 2020 The 3rd International Conference on Information Science and System. ACM; 2020:166‐170 (en).
- 22. Park AJ, Tsang HH, Sun M, Glässer U. An agent‐based model and computational framework for counter‐terrorism and public safety based on swarm intelligencea. Sec Inform. 2012;1(1):23. 10.1186/2190-8532-1-23 [DOI] [Google Scholar]
- 23. Elliott J, Lovering A, Gerrard C. Enhancing safety assurance using security concepts. In: Achievement and Assurance of Safety. Springer; 1995:90‐116. [Google Scholar]
- 24. Eames DP, Moffett J. The integration of safety and security requirements. In: International Conference on Computer Safety, Reliability, and Security. Springer; 1999:468‐480.
- 25. Novak T, Treytl A, Palensky P. Common approach to functional safety and system security in building automation and control systems. In: 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007). IEEE; 2007:1141‐1148.
- 26. Poslad S. Using multi‐agent systems to specify safe and secure services for virtual organisations. In: Safety and Security in Multiagent Systems. Springer; 2009:258‐273. [Google Scholar]
- 27. Sun M, Mohan S, Sha L, Gunter C. Addressing safety and security contradictions in cyber‐physical systems. In: Proceedings of the 1st Workshop on Future Directions in Cyber‐Physical Systems Security (CPSSW'09). CiteSeer; 2009.
- 28. Piètre‐Cambacédès L, Bouissou M. Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes). In: 2010 IEEE International Conference on Systems, Man and Cybernetics. IEEE; 2010:2852‐2861.
- 29. Amthor P, Kühnhauser WE, Pölck A. Model‐based safety analysis of SELinux security policies. In: 2011 5th International Conference on Network and System Security. IEEE; 2011:208‐215.
- 30. Oates R, Foulkes D, Herries G, Banham D. Practical extensions of safety critical engineering processes for securing industrial control systems. In: 8th IET International System Safety Conference Incorporating the Cyber Security Conference 2013. IET; 2013:1‐6.
- 31. Apvrille L, Roudier Y. Designing safe and secure embedded and cyber‐physical systems with SysML‐Sec. In: International Conference on Model‐Driven Engineering and Software Development. Springer; 2015:293‐308.
- 32. Hessami AG. A systems view of railway safety and security. In: Railway Research‐Selected Topics on Development, Safety and Technology. IntechOpen; 2015. [Google Scholar]
- 33. Troubitsyna E, Laibinis L, Pereverzeva I, Kuismin T, Ilic D, Latvala T. Towards security‐explicit formal modelling of safety‐critical systems. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2016:213‐225.
- 34. Troubitsyna E. An integrated approach to deriving safety and security requirements from safety cases. In: 40th IEEE Annual Computer Software and Applications Conference, COMPSAC Workshops 2016. IEEE; 2016:614‐615.
- 35. Brunner M, Huber M, Sauerwein C, Breu R. Towards an integrated model for safety and security requirements of cyber‐physical systems. In: 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS‐C). IEEE; 2017:334‐340.
- 36. Ponsard C, Grandclaudon J, Massonet P, Touzani M. Assessment of emerging standards for safety and security co‐design on a railway case study. In: International Conference on Model and Data Engineering. Springer; 2018:130‐145.
- 37. Papakonstantinou N, Linnosmaa J, Alanen J, Bashir AZ, O'Halloran B, Van Bossuyt DL. Early hybrid safety and security risk assessment based on interdisciplinary dependency models. In: 2019 Annual Reliability and Maintainability Symposium (RAMS). IEEE; 2019:1‐7.
- 38. Fischer A, Ku W. Efficient algorithmic safety analysis of HRU security models. In: 2010 International Conference on Security and Cryptography (SECRYPT). IEEE; 2010:1‐10.
- 39. Pedroza G, Apvrille L, Knorreck D. AVATAR: a SysML environment for the formal verification of safety and security properties. In: 2011 11th Annual International Conference on New Technologies of Distributed Systems. IEEE; 2011:1‐10.
- 40. Johnson CW, Yepez AA. Mapping the impact of security threats on safety‐critical global navigation satellite systems. In: To appear in the Proceedings of the 29th International Systems Safety Society Conference. CiteSeer; 2011.
- 41. Johnson CW, Yepez AA. Cyber security threats to safety‐critical space‐based infrastructures. In: Proceedings of the Fifth Conference of the International Association for the Advancement of Space Safety. CiteSeer; 2011.
- 42. Monakova G, Brucker AD, Schaad A. Security and safety of assets in business processes. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing. ACM; 2012:1667‐1673.
- 43. Monakova G, Severin C, Brucker AD, Flegel U, Schaad A. Monitoring security and safety of assets in supply chains. In: Future Security Research Conference. Springer; 2012:9‐20.
- 44. Raspotnig C, Karpati P, Katta V. A combined process for elicitation and analysis of safety and security requirements. In: Enterprise, Business‐Process and Information Systems Modeling. Springer; 2012:347‐361.
- 45. Dong W, Zhao C, Shu S, Leucker M. Anticipatory active monitoring for safety‐ and security‐critical software. Sci China Inf Sci. 2012;55(12):2723‐2737. 10.1007/s11432-012-4739-8 [DOI] [Google Scholar]
- 46. Kornecki AJ, Subramanian N, Zalewski J. Studying interrelationships of safety and security for software assurance in cyber‐physical systems: approach based on Bayesian belief networks. In: 2013 Federated Conference on Computer Science and Information Systems. IEEE; 2013:1393‐1399.
- 47. Bieber P, Brunel J. From safety models to security models: preliminary lessons learnt. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:269‐281.
- 48. Brunel J, Chemouil D. Safety and security assessment of behavioral properties using alloy. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2015:251‐263.
- 49. Li T, Hankin C. A model‐based approach to interdependency between safety and security in ICS. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research. BCS Learning & Development Ltd.; 2015:31‐41.
- 50. Taguchi K, Souma D, Nishihara H. Safe & Sec case patterns. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2015:27‐37.
- 51. Ponsard C, Dallons G, Massonet P. Goal‐oriented co‐engineering of security and safety requirements in cyber‐physical systems. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2016:334‐345.
- 52. Pereira D, Hirata C, Pagliares R, Nadjm‐Tehrani S. Towards combined safety and security constraints analysis. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2017:70‐80.
- 53. Vistbakka I, Troubitsyna E, Kuismin T, Latvala T. Co‐engineering safety and security in industrial control systems: a formal outlook. In: International Workshop on Software Engineering for Resilient Systems. Springer; 2017:96‐114.
- 54. Amthor P. Efficient heuristic safety analysis of core‐based security policies. In: ICETE 2017—Proceedings of the 14th International Joint Conference on e‐Business and Telecommunications. SCITEPRESS; 2017:384‐392.
- 55. Pawlik M. Application of the safety and security impact reference model for communication based train control and management systems. In: International Conference on Transport Systems Telematics. Springer; 2018:263‐277.
- 56. Troubitsyna E, Vistbakka I. Deriving and formalising safety and security requirements for control systems. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2018:107‐122.
- 57. Sangchoolie B, Folkesson P, Vinter J. A study of the interplay between safety and security using model‐implemented fault injection. In: 2018 14th European Dependable Computing Conference (EDCC). IEEE; 2018:41‐48.
- 58. Sabaliauskaite G, Liew LS, Cui J. Integrating autonomous vehicle safety and security analysis using STPA method and the six‐step model. Int J Adv Sec. 2018;11(1&2):160‐169. [Google Scholar]
- 59. Vistbakka I, Troubitsyna E. Towards a formal approach to analysing security of safety‐critical systems. In: 2018 14th European Dependable Computing Conference (EDCC). IEEE; 2018:182‐189.
- 60. De Souza NP, César CDAC, Bezerra JDM, Hirata CM. STAMP‐based approach to analyze safety, security and data privacy. In: 2019 9th Latin‐American Symposium on Dependable Computing, LADC 2019—Proceedings. IEEE; 2019.
- 61. Huang L, Kang E‐Y. Formal verification of safety & security related timing constraints for a cooperative automotive system. In: International Conference on Fundamental Approaches to Software Engineering. Springer; 2019:210‐227.
- 62. Vistbakka I, Troubitsyna E. Pattern‐based formal approach to analyse security and safety of control systems. In: International Symposium on Model‐Based Safety and Assessment. Springer; 2019:363‐378.
- 63. Andrea M, Philippe M, Sbastien D, Jeremy G. Towards incremental safety and security requirements co‐certification. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE; 2020:79‐84.
- 64. Hecht M, Chuidian A, Tanaka T, Raymond R. Automated generation of FMEAs using SysML for reliability, safety, and cybersecurity. In: 2020 Annual Reliability and Maintainability Symposium (RAMS). IEEE; 2020:1‐7.
- 65. Japs S. Security & safety by model‐based requirements engineering. In: 2020 IEEE 28th International Requirements Engineering Conference (RE). IEEE; 2020:422‐427.
- 66. Papakonstantinou N, Linnosmaa J, Bashir AZ, Malm T, Van Bossuyt DL. Early combined safety‐security defense in depth assessment of complex systems. In: 2020 Annual Reliability and Maintainability Symposium (RAMS). IEEE; 2020:1‐7.
- 67. Pedroza G, Mockly G. Method and framework for security risks analysis guided by safety criteria. In: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings. ACM; 2020:1‐8.
- 68. Poorhadi E, Troubitysna E, Dan G. Formalising the impact of security attacks on IoT safety. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2020:69‐81.
- 69. Piètre‐Cambacédès L, Chaudet C. The SEMA referential framework: avoiding ambiguities in the terms security and safety. Int J Crit Infrastruct Protect. 2010;3(2):55‐66. [Google Scholar]
- 70. Roudier Y, Apvrille L. SysML‐Sec: a model driven approach for designing safe and secure systems. In: 2015 3rd International Conference on Model‐Driven Engineering and Software Development (MODELSWARD). IEEE; 2015:655‐664.
- 71. Ameur‐Boulifa R, Lugou F, Apvrille L. SysML model transformation for safety and security analysis. In: Security and Safety Interplay of Intelligent Software Systems. Springer; 2018:35‐49. [Google Scholar]
- 72. Zoor M, Apvrille L, Pacalet R. SysML models: studying safety and security measures impact on performance using graph tainting. In: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings. IEEE; 2020:1‐10.
- 73. Katta V, Raspotnig C, Karpati P, Stålhane T. Requirements management in a combined process for safety and security assessments. In: 2013 International Conference on Availability, Reliability and Security. IEEE; 2013:780‐786.
- 74. Cockram TJ, Lautieri SR. Combining security and safety principles in practice. In: Proceedings of the 2nd Institution of Engineering and Technology International Conference on System Safety. IET; 2007:159‐164.
- 75. Varrette S, Roch J‐L, Duc G, Keryell R. Building secure resources to ensure safe computations in distributed and potentially corrupted environments. In: European Conference on Parallel Processing. Springer; 2008:211‐222.
- 76. Glässer U, Jackson P, Araghi AK, Wehn H, Shahir HY. A collaborative decision support model for marine safety and security operations. In: Distributed, Parallel and Biologically Inspired Systems. Springer; 2010:266‐277. [Google Scholar]
- 77. Glässer U, Jackson P, Araghi AK, Shahir HY. Intelligent decision support for marine safety and security operations. In: 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE; 2010:101‐107.
- 78. Ugljesa E, Wacker H‐D, Börcsök J. Modeling security aspects in safety environment. In: 2011 7th International Conference on Electrical and Electronics Engineering (ELECO). IEEE; 2011:II‐46.
- 79. Brunel J, Rioux L, Paul S, Faucogney A, Vallée F. Formal safety and security assessment of an avionic architecture with alloy. In: Third International Workshop on Engineering Safety and Security Systems (ESSS'14). arXiv; 2014:8‐19.
- 80. Tverdyshev S, Blasum H, Rudina E, Kulagin D, Dyakin P, Moiseev S. Security architecture and specification framework for safe and secure industrial automation. In: International Conference on Critical Information Infrastructures Security. Springer; 2015:3‐14.
- 81. Johnson N, Kelly T. Devil's in the detail: through‐life safety and security co‐assurance using SSAF. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2019:299‐314.
- 82. Tekaat J, Kharatyan A, Anacker H, Dumitrescu R. Potentials for the integration of design thinking along automotive systems engineering focusing security and safety. Proc Design Soc: Int Conf Eng Design. 2019;1(1):2883‐2892. [Google Scholar]
- 83. Sellitto GP, Aranha H, Masi M, Pavleska T. Security and safety by design in the internet of actors: an architectural approach. In: International Conference on Subject‐Oriented Business Process Management. Springer; 2020:133‐142.
- 84. Winther R, Johnsen O‐A, Gran BA. Security assessments of safety critical systems using HAZOPs. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2001:14‐24.
- 85. Preschern C, Kajtazovic N, Kreiner C. Security analysis of safety patterns. In: Proceedings of the 20th Conference on Pattern Languages of Programs. ACM; 2013:1‐38.
- 86. Steiner M, Liggesmeyer P. Combination of safety and security analysis—finding security problems that threaten the safety of a system. In: SAFECOMP 2013—Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber‐Physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security. Springer; 2013.
- 87. Kornecki AJ, Liu M. Fault tree analysis for safety/security verification in aviation software. Electron. 2013;2(1):41‐56. [Google Scholar]
- 88. Kriaa S, Bouissou M, Colin F, Halgand Y, Pietre‐Cambacedes L. Safety and security interactions modeling using the BDMP formalism: case study of a pipeline. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:326‐341.
- 89. Schmittner C, Ma Z, Smith P. FMVEA for safety and security analysis of intelligent and cooperative vehicles. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:282‐288.
- 90. Woskowski C. A pragmatic approach towards safe and secure medical device integration. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:342‐353.
- 91. Chen Y, Chen S, Hsiung P, Chou I. Unified security and safety risk assessment—a case study on nuclear power plant. In: 2014 International Conference on Trustworthy Systems and Their Applications. IEEE; 2014:22‐28.
- 92. Macher G, Höller A, Sporer H, Armengaud E, Kreiner C. A combined safety‐hazards and security‐threat analysis method for automotive systems. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:237‐250.
- 93. Macher G, Höller A, Sporer H, Armengaud E, Kreiner C. A comprehensive safety, security, and serviceability assessment method. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:410‐424.
- 94. Schmittner C, Ma Z, Schoitsch E, Gruber T. A case study of FMVEA and CHASSIS as safety and security co‐analysis method for automotive cyber‐physical systems. In: Proceedings of the 1st ACM Workshop on Cyber‐Physical System Security. ACM; 2015:69‐80.
- 95. Subramanian N, Zalewski J. Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst J. 2016;10(2):397‐409. [Google Scholar]
- 96. Kumar R, Stoelinga M. Quantitative security and safety analysis with attack‐fault trees. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE; 2017:25‐32.
- 97. Śliwiński M, Piesik E, Piesik J. Integrated functional safety and cyber security analysis. IFAC‐PapersOnLine. 2018;51(24):1263‐1270. [Google Scholar]
- 98. Rauscher J, Bauer B. Safety and security architecture analyses framework for the internet of things of medical devices. In: 2018 IEEE 20th International Conference on e‐Health Networking, Applications and Services (Healthcom). IEEE; 2018:1‐3.
- 99. Dobaj J, Schmittner C, Krisper M, Macher G. Towards integrated quantitative security and safety risk assessment. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2019:102‐116.
- 100. Preschern C, Kajtazovic N, Kreiner C. Safety architecture pattern system with security aspects. In: Transactions on Pattern Languages of Programming IV. Springer; 2019:22‐75.
- 101. Verma S, Gruber T, Schmittner C, Puschner P. Combined approach for safety and security. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2019:87‐101.
- 102. Gautham S, Bakirtzis G, Leccadito MT, Klenke RH, Elks CR. A multilevel cybersecurity and safety monitor for embedded cyber‐physical systems: WIP abstract. In: Proceedings of the 10th ACM/IEEE International Conference on Cyber‐Physical Systems. IEEE; 2019:320‐321.
- 103. Gautham S, Jayakumar AV, Elks C. Multilevel runtime security and safety monitoring for cyber physical systems using model‐based engineering. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2020:193‐204.
- 104. Kumar R. A model‐based safety‐security risk analysis framework for interconnected critical infrastructures. In: International Conference on Critical Infrastructure Protection. Springer; 2020:283‐306.
- 105. Martin H, Ma Z, Schmittner C, et al. Combined automotive safety and security pattern engineering approach. Reliab Eng Syst Safety. 2020;198:106773. [Google Scholar]
- 106. Procter S. Architecture‐level security concerns in a safety critical system. Ada Lett. 2020;39(1):50‐62. 10.1145/3379106.3379112 [DOI] [Google Scholar]
- 107. Rauscher J, Bauer B. Design optimization of IoT models: structured safety and security flaw identification. In: International Symposium on Business Modeling and Software Design. Springer; 2020:84‐102.
- 108. Jackson P, Glässer U, Shahir HY, Wehn H. An extensible decision engine for marine safety and security. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics. IEEE; 2011:54‐59.
- 109. Banerjee A, Venkatasubramanian KK, Mukherjee T, Gupta SKS. Ensuring safety, security, and sustainability of mission‐critical cyber physical systems. Proc IEEE. 2012;100(1):283‐299. [Google Scholar]
- 110. Young W, Leveson N. Systems thinking for safety and security. In: Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC'13. ACM; 2013:1‐8. [Google Scholar]
- 111. Young W, Leveson NG. An integrated approach to safety and security based on systems theory. Commun ACM. 2014;57(2):31‐35. [Google Scholar]
- 112. Brunel J, Chemouil D, Rioux L, Bakkali M, Vallée F. A viewpoint‐based approach for formal safety & security assessment of system architectures. In: 11th Workshop on Model‐Driven Engineering, Verification and Validation, Vol 1235. Spain: HAL; 2014:39‐48. https://hal.archives-ouvertes.fr/hal-01070960 [Google Scholar]
- 113. Kriaa S, Bouissou M, Laarouchi Y. A model based approach for SCADA safety and security joint modelling: S‐cube. In: 10th IET System Safety and Cyber‐Security Conference 2015. IET; 2015:1‐6.
- 114. Chen D, Meinke K, Östberg K, Asplund F, Baumann C. A knowledge‐in‐the‐loop approach to integrated safety amp;security for cooperative system‐of‐systems. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE; 2015:13‐20.
- 115. Cimatti A, DeLong R, Marcantonio D, Tonetta S. Combining MILS with contract‐based design for safety and security requirements. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:264‐276.
- 116. Schmittner C, Ma Z, Puschner P. Limitation and improvement of STPA‐Sec for safety and security co‐analysis. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2016:195‐209.
- 117. Martin H, Bramberger R, Schmittner C, et al. Safety and security co‐engineering and argumentation framework. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2017:286‐297.
- 118. Hazell PM. Integrating IEC 62443 cyber security with existing industrial process and functional safety management systems. Engineering & Technology Reference; 2017.
- 119. Amorim T, Martin H, Ma Z, et al. Systematic pattern approach for safety and security co‐engineering in the automotive domain. In: International Conference on Computer Safety, Reliability, and Security; 2017:329‐342.
- 120. Friedberg I, McLaughlin K, Smith P, Laverty D, Sezer S. STPA‐SafeSec: safety and security analysis for cyber‐physical systems. J Inf Sec Appl. 2017;34:183‐196. [Google Scholar]
- 121. Sojka M, Kreč M, Hanzálek Z. Case study on combined validation of safety & security requirements. In: Proceedings of the 9th IEEE International Symposium on Industrial Embedded Systems (SIES 2014). IEEE; 2014:244‐251.
- 122. Shahir HY, Glässer U, Jackson P, Wehn H. Test‐case generation for marine safety and security scenarios. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics. IEEE; 2011:48‐53.
- 123. Shahir HY, Glässer U, Farahbod R, Jackson P, Wehn H. Generating test cases for marine safety and security scenarios: a composition framework. Sec Info. 2012;1(1):4. 10.1186/2190-8532-1-4 [DOI] [Google Scholar]
- 124. Kleidermacher D, Kleidermacher M. Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development. Elsevier; 2012. [Google Scholar]
- 125. Bagnara R, Bagnara A, Hill PM. The MISRA C coding standard and its role in the development and analysis of safety‐and security‐critical embedded software. In: International Static Analysis Symposium. Springer; 2018:5‐23.
- 126. Tariq MU, Florence J, Wolf M. Improving the safety and security of wide‐area cyber‐physical systems through a resource‐aware, service‐oriented development methodology. Proc IEEE. 2018;106(1):144‐159. [Google Scholar]
- 127. Burns A, McDermid J, Dobson J. On the meaning of safety and security. The Comput J. 1992;35(1):3‐15. 10.1093/comjnl/35.1.3 [DOI] [Google Scholar]
- 128. Brewer DFC. Applying security techniques to achieving safety. In: Directions in Safety‐Critical Systems. Springer; 1993:246‐256. [Google Scholar]
- 129. Blanquart J‐P, Bieber P, Descargues G, Hazane E, Julien M, Léonardon L. Similarities and dissimilarities between safety levels and security levels. In: Proceedings of the Embedded Real‐Time Systems and Software Conference (ERTS2012). HAL; 2012.
- 130. Piètre‐Cambacédès L, Bouissou M. Cross‐fertilization between safety and security engineering. Reliab Eng Syst Safety. 2013;110:110‐126. [Google Scholar]
- 131. Leveson NG, Daouk M, Dulac N, Marais K. Applying STAMP in accident analysis. Working Paper, Massachusetts Institute of Technology. Engineering Systems Division; 2003.
- 132. Ishimatsu T, Leveson NG, Thomas J, Katahira M, Miyamoto Y, Nakao H. Modeling and Hazard Analysis Using STPA. In: Proceedings of the 4th IAASS Conference, Making Safety Matter; 2010.
- 133. Pereira DP, Hirata C, Nadjm‐Tehrani S. A STAMP‐based ontology approach to support safety and security analyses. J Inf Sec Appl. 2019;47:302‐319. [Google Scholar]
- 134. Raspotnig C, Opdahl A. Comparing risk identification techniques for safety and security requirements. J Syst Softw. 2013;86(4):1124‐1151. [Google Scholar]
- 135. Nostro N, Bondavalli A, Silva N. Adding security concerns to safety critical certification. In: 2014 IEEE International Symposium on Software Reliability Engineering Workshops. IEEE; 2014:521‐526.
- 136. Bassetti C, Ferrario R, Campos MLM. Airport security checkpoints: an empirically‐grounded ontological model for supporting collaborative work practices in safety critical environments. In: ISCRAM 2015 Conference Proceedings—12th International Conference on Information Systems for Crisis Response and Management. ISCRAM; 2015.
- 137. Wu F, Eagles S. Cybersecurity for medical device manufacturers: Ensuring safety and functionality. Biomed Instrum Technol. 2016;50(1):23‐34. [DOI] [PubMed] [Google Scholar]
- 138. Fruth J, Nett E. Uniform approach of risk communication in distributed it environments combining safety and security aspects. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2014:289‐300.
- 139. Chockalingam S, Hadžiosmanović D, Pieters W, Teixeira A, Gelder P. Integrated safety and security risk assessment methods: a survey of key characteristics and applications. In: International Conference on Critical Information Infrastructures security. Springer; 2016:50‐62.
- 140. Pawlik M. Safety, security and cybersecurity in railway operation. In: Safety and Reliability‐Theory and Applications. In: 27th European Safety & Reliability Conference, ESREL. ESREL; 2017:1843‐1852.
- 141. Huber M, Brunner M, Sauerwein C, Carlan C, Breu R. Roadblocks on the highway to secure cars: an exploratory survey on the current safety and security practice of the automotive industry. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2018:157‐171.
- 142. Macher G, Druml N, Veledar O, Reckenzaun J. Safety and security aspects of fail‐operational urban surround perception (FUSION). In: International Symposium on Model‐Based Safety and Assessment. Springer; 2019:286‐300.
- 143. Hansen K. Security attack analysis of safety systems. In: 2009 IEEE Conference on Emerging Technologies & Factory Automation (ETFA). IEEE; 2009:1‐4.
- 144. Kriaa S, Pietre‐Cambacedes L, Bouissou M, Halgand Y. A survey of approaches combining safety and security for industrial control systems. Reliab Eng Syst Safety. 2015;139:156‐178. [Google Scholar]
- 145. Goertzel KM. Software survivability: where safety and security converge. Crosstalk, The J Def Softw Eng. 2009;22(6):15‐19. [Google Scholar]
- 146. Elmaghraby AS, Losavio MM. Cyber security challenges in Smart Cities: safety, security and privacy. J Adv Res. 2014;5(4):491‐497. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 147. Robinson‐Mallett C, Kaiser B, Meyer J. Safety and security for networked vehicles. ATZ Worldwide. 2014;116(10):34‐37. 10.1007/s38311-014-0230-z [DOI] [Google Scholar]
- 148. Schoitsch E, Schmittner C, Ma Z, Gruber T. The need for safety and cyber‐security co‐engineering and standardization for highly automated automotive vehicles. In: Advanced Microsystems for Automotive Applications 2015. Springer; 2016:251‐261.
- 149. Wolf M, Serpanos D. Safety and security of cyber‐physical and internet of things systems [point of view]. Proc IEEE. 2017;105(6):983‐984. [Google Scholar]
- 150. Sabaliauskaite G, Mathur AP. Aligning cyber‐physical system safety and security. In: Complex Systems Design & Management Asia. Springer; 2015:41‐53. [Google Scholar]
- 151. Schmittner C, Ma Z. Towards a framework for alignment between automotive safety and security standards. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2015:133‐143.
- 152. Paul S, Rioux L. Over 20 years of research into cybersecurity and safety engineering: a short bibliography. Safety Sec Eng. 2015;5:335‐349. [Google Scholar]
- 153. Piggin RSH, Boyes HA. Safety and security a story of interdependence. In: 10th IET System Safety and Cyber‐Security Conference 2015. IET; 2015:1‐6.
- 154. Aven T. A unified framework for risk and vulnerability analysis covering both safety and security. Reliab Eng Syst Safety. 2007;92(6):745‐754. [Google Scholar]
- 155. Kanamaru H. Bridging functional safety and cyber security of SIS/SCS. In: 2017 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE). IEEE; 2017:279‐284.
- 156. Stoneburner G. Toward a unified security‐safety model. Computer. 2006;39(8):96‐97. [Google Scholar]
- 157. Skoglund M, Warg F, Sangchoolie B. In search of synergies in a multi‐concern development lifecycle: safety and cybersecurity. In: International Conference on Computer Safety, Reliability, and Security. Springer; 2018:302‐313.
- 158. Bonfanti S, Gargantini A, Mashkoor A. Generation of C++ unit tests from abstract state machines specifications. In: 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops. IEEE; 2018:185‐193.
- 159. Broy M, Kirstan S, Krcmar H, Schätz B. What is the benefit of a model‐based design of embedded software systems in the car industry? In: Emerging Technologies for the Evolution and Maintenance of Software Models. IGI Global; 2012:343‐369. [Google Scholar]
- 160. Mashkoor A, Sametinger J. Rigorous modeling and analysis of interoperable medical devices. In: Proceedings of the Modeling and Simulation in Medicine Symposium (MSM'16). ACM; 2016:800‐807. http://dl.acm.org/citation.cfm?id=2962683
- 161. Valdivia LJ, Adin I, Arrizabalaga S, Anorga J, Mendizabal J. Cybersecurity‐the forgotten issue in railways: security can be woven into safety designs. IEEE Veh Technol Mag. 2018;13(1):48‐55. [Google Scholar]
- 162. Hoang TS, Butler M, Reichl K. The hybrid ERTMS/ETCS level 3 case study. In: International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z. Springer; 2018:251‐261.
- 163. TG1 IW . Recommendations to align safety and security for industrial automation control systems, International Society for Automation (ISA); 2015. http://automatie-pma.com/pdf/safety-and-security-for-IACS.pdf
- 164. Mashkoor A, Kossak F, Egyed A. Evaluating the suitability of state‐based formal methods for industrial deployment. Softw Pract Exper. 2018;48(12):2350‐2379. 10.1002/spe.2634 [DOI] [Google Scholar]
- 165. Kossak F, Mashkoor A. How to select the suitable formal method for an industrial application: a survey. In: International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z. Springer; 2016:213‐228.
- 166. Kossak F, Mashkoor A, Geist V, Illibauer C. Improving the understandability of formal specifications: an experience report. In: International Working Conference on Requirements Engineering: Foundation for Software Quality. Springer; 2014:184‐199.
- 167. Snook C, Butler M. UML‐B: formal modeling and design aided by UML. ACM Trans Softw Eng Methodol. 2006;15(1):92‐122. [Google Scholar]
- 168. Mashkoor A, Matoussi A. Towards validation of requirements models. In: 2nd international conference on Abstract State Machines (ASM), Alloy, B and Z (ABZ'10). Springer; 2010.
- 169. Khan S, Hasan O, Mashkoor A. Formal verification and safety assessment of a hemodialysis machine. In: International Conference on Current Trends in Theory and Practice of Informatics. Springer; 2018:241‐254.
- 170. Mashkoor A. Model‐driven development of high‐assurance active medical devices. Softw Qual J. 2016;24(3):571‐596. 10.1007/s11219-015-9288-0 [DOI] [Google Scholar]
- 171. Zhou X, Jin Y, Zhang H, Li S, Huang X. A map of threats to validity of systematic literature reviews in software engineering. In: 2016 23rd Asia‐Pacific Software Engineering Conference (APSEC). IEEE; 2016:153‐160.
- 172. Dyba T, Dingsoyr T, Hanssen GK. Applying systematic reviews to diverse study types: an experience report. In: First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007). IEEE; 2007:225‐234.
- 173. Wohlin C, Runeson P, da Mota Silveira Neto PA, Engström E, Do Carmo Machado I, de Almeida ES. On the reliability of mapping studies in software engineering. J Syst Softw. 2013;86(10):2594‐2610. [Google Scholar]
- 174. Abulamddi MF. A survey on techniques requirements for integrating safety and security engineering for cyber‐physical systems. J Comput Commun. 2017;5:94‐100. [Google Scholar]
- 175. Ponsard C, Grandclaudon J, Massonet P. A goal‐driven approach for the joint deployment of safety and security standards for operators of essential services. J Softw: Evol Process. 2021;2021:e2338. [Google Scholar]
- 176. Lisova E, Šljivo I, Čaušević A. Safety and security co‐analyses: a systematic literature review. IEEE Syst J. 2019;13(3):2189‐2200. [Google Scholar]
- 177. Zhang W. Handover decision using fuzzy MADM in heterogeneous networks. In: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733). Vol 2. IEEE; 2004:653‐658.
- 178. Link J, Waedt K, Ben Zid I, Lou X. Current challenges of the joint consideration of functional safety cyber security, their interoperability and impact on organizations: How to manage RAMS + S (reliability availability maintainability safety + security). In: 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS). IEEE; 2018:185‐191.
- 179. Biro M, Mashkoor A, Sametinger J, Seker R. Software safety and security risk mitigation in cyber‐physical systems. IEEE Softw. 2018;35(1):24‐29. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The data that support the findings of this study are openly available in Zenodo at https://doi.org/10.5281/zenodo.5785657.
