{"id":"https://openalex.org/W3038087955","doi":"https://doi.org/10.1109/dessert50317.2020.9125005","title":"Structured Argumentation for Assurance Case of Monitoring System based on UAVs","display_name":"Structured Argumentation for Assurance Case of Monitoring System based on UAVs","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3038087955","doi":"https://doi.org/10.1109/dessert50317.2020.9125005","mag":"3038087955"},"language":"en","primary_location":{"id":"doi:10.1109/dessert50317.2020.9125005","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dessert50317.2020.9125005","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066502447","display_name":"Vladimir Sklyar","orcid":"https://orcid.org/0000-0001-5425-4098"},"institutions":[{"id":"https://openalex.org/I23686167","display_name":"National Aerospace University \u2013 Kharkiv Aviation Institute","ror":"https://ror.org/048j5n646","country_code":"UA","type":"education","lineage":["https://openalex.org/I23686167"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Vladimir Sklyar","raw_affiliation_strings":["Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \"KhAI\", Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \"KhAI\", Kharkiv, Ukraine","institution_ids":["https://openalex.org/I23686167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066848534","display_name":"Vyacheslav Kharchenko","orcid":"https://orcid.org/0000-0001-5352-077X"},"institutions":[{"id":"https://openalex.org/I23686167","display_name":"National Aerospace University \u2013 Kharkiv Aviation Institute","ror":"https://ror.org/048j5n646","country_code":"UA","type":"education","lineage":["https://openalex.org/I23686167"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vyacheslav Kharchenko","raw_affiliation_strings":["Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \"KhAI\", Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \"KhAI\", Kharkiv, Ukraine","institution_ids":["https://openalex.org/I23686167"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066502447"],"corresponding_institution_ids":["https://openalex.org/I23686167"],"apc_list":null,"apc_paid":null,"fwci":0.1865,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49778336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"17","issue":null,"first_page":"40","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14306","display_name":"Technology Assessment and Management","score":0.9513999819755554,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/argumentation-theory","display_name":"Argumentation theory","score":0.9271128177642822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6628422737121582},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.6339583396911621},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.520068347454071},{"id":"https://openalex.org/keywords/safety-case","display_name":"Safety case","score":0.4742668867111206},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4656197726726532},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.43283534049987793},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4145756959915161},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3359920382499695},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32113704085350037},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21586734056472778},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20474505424499512},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.16514238715171814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15176331996917725},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.09841769933700562}],"concepts":[{"id":"https://openalex.org/C65059942","wikidata":"https://www.wikidata.org/wiki/Q270105","display_name":"Argumentation theory","level":2,"score":0.9271128177642822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6628422737121582},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.6339583396911621},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.520068347454071},{"id":"https://openalex.org/C2780234205","wikidata":"https://www.wikidata.org/wiki/Q2281276","display_name":"Safety case","level":2,"score":0.4742668867111206},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4656197726726532},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.43283534049987793},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4145756959915161},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3359920382499695},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32113704085350037},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21586734056472778},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20474505424499512},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.16514238715171814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15176331996917725},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.09841769933700562},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dessert50317.2020.9125005","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dessert50317.2020.9125005","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W61178628","https://openalex.org/W1558155129","https://openalex.org/W2071108033","https://openalex.org/W2152646366","https://openalex.org/W2623156824","https://openalex.org/W2738233416","https://openalex.org/W2740475669","https://openalex.org/W2771556681","https://openalex.org/W2888222909","https://openalex.org/W2893627521","https://openalex.org/W2899707149","https://openalex.org/W2944081964","https://openalex.org/W2965663062","https://openalex.org/W2971043526","https://openalex.org/W2972903877","https://openalex.org/W2997331293","https://openalex.org/W4213005242","https://openalex.org/W6746035977","https://openalex.org/W6754181176","https://openalex.org/W6884943038"],"related_works":["https://openalex.org/W2980516505","https://openalex.org/W1571551520","https://openalex.org/W2111290067","https://openalex.org/W2006426112","https://openalex.org/W2354489789","https://openalex.org/W2373668370","https://openalex.org/W2035636390","https://openalex.org/W2161017395","https://openalex.org/W336498736","https://openalex.org/W1913231191"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3],"propose":[4],"to":[5,13],"apply":[6],"structured":[7,37,78,88],"argumentation":[8,38,106],"for":[9,20,91,134],"Assurance":[10,49,58,118],"Case":[11,50,59,119],"methodology":[12],"continue":[14],"developing":[15],"a":[16,110],"concept":[17],"of":[18,47,56,68,80,83,103,112,137],"licensing":[19],"Nuclear":[21],"Power":[22],"Plants":[23],"PostAccident":[24],"Monitoring":[25],"System":[26],"(PAMS)":[27],"based":[28,63],"on":[29,64],"Unmanned":[30],"Aircraft":[31],"Vehicles":[32],"(UAVs).":[33],"We":[34],"obtained":[35,95,126],"the":[36,41,43,48,52,57,65,69,77,81,86,101,104,117],"method":[39,96],"including":[40],"following:":[42],"new":[44,53],"overall":[45],"algorithm":[46],"development;":[51],"proposed":[54],"structure":[55,67],"graph,":[60],"which":[61],"is":[62,72],"typical":[66],"arguments":[70,92],"and":[71,121,128,139,143],"developed":[73],"in":[74],"connection":[75],"with":[76,109,116],"text":[79,89],"description":[82],"these":[84],"arguments;":[85],"improved":[87],"templates":[90],"description.":[93],"The":[94,125],"can":[97],"be":[98,132],"used":[99,133],"as":[100],"basis":[102],"appropriated":[105],"framework":[107],"supported":[108,122],"set":[111],"formal":[113],"operations":[114],"performed":[115],"graph":[120],"structural":[123],"text.":[124],"practical":[127],"theoretical":[129],"results":[130],"may":[131],"any":[135],"kinds":[136],"safety":[138],"security":[140],"critical":[141],"systems":[142],"applications.":[144]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
