{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:52:32Z","timestamp":1743112352239,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030321680"},{"type":"electronic","value":"9783030321697"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32169-7_10","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T18:10:26Z","timestamp":1569953426000},"page":"130-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Micro Failure Region Models Inducing Massive Correlated Failures on Networks Topologies"],"prefix":"10.1007","author":[{"given":"Nicol\u00e1s A.","family":"Boettcher","sequence":"first","affiliation":[]},{"given":"Yasmany","family":"Prieto","sequence":"additional","affiliation":[]},{"given":"Jorge E.","family":"Pezoa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Kunkel, C.M., Hallberg, R.W., Oppenheimer, M.: Coral reefs reduce tsunami impact in model simulations. Geophys. Res. Lett. 33(23) (2006)","DOI":"10.1029\/2006GL027892"},{"issue":"10","key":"10_CR2","doi-asserted-by":"publisher","first-page":"e0186455","DOI":"10.1371\/journal.pone.0186455","volume":"12","author":"JP Arias","year":"2017","unstructured":"Arias, J.P., Bronfman, N.C., Cisternas, P.C., Repetto, P.B.: Hazard proximity and risk perception of tsunamis in coastal cities: are people able to identify their risk? PLoS ONE 12(10), e0186455 (2017)","journal-title":"PLoS ONE"},{"key":"10_CR3","unstructured":"Weems, T. L.: How far is far enough. Disaster Recovery J. 16(2) (2003)"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Pa\u02c7si\u00b4c, A., Girao-Silva, R., Vass, B., Gomes, T., Babarczi, P.: FRADIR: a novel framework for disaster resilience. In: 10th International Workshop on Resilient Networks Design and Modeling (RNDM), pp. 1\u20137. IEEE, Norway (2018). https:\/\/doi.org\/10.1109\/RNDM.2018.8489828","DOI":"10.1109\/RNDM.2018.8489828"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Rahnamay-Naeini, M., Pezoa, J.E., Azar, G., Ghani, N., Hayat, M.M.: Modeling stochastic correlated failures and their effects on network reliability. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20136. IEEE, Hawaii (2011). https:\/\/doi.org\/10.1109\/ICCCN.2011.6005789","DOI":"10.1109\/ICCCN.2011.6005789"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Cheng, Y., Sterbenz, J.P.: Critical region identification and geodiverse routing protocol under massive challenges. In: The 7th edition of RNDM (International Workshop on Reliable Networks Design and Modeling), pp. 14\u201320. IEEE, Germany (2015). https:\/\/doi.org\/10.1109\/RNDM.2015.7324303","DOI":"10.1109\/RNDM.2015.7324303"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/TNET.2014.2309253","volume":"23","author":"S Trajanovski","year":"2015","unstructured":"Trajanovski, S., Kuipers, F.A., Ili\u00b4c, A., Crowcroft, J., Van Mieghem, P.: Finding critical regions and region-disjoint paths in a network. IEEE\/ACM Trans. Networking (TON) 23(3), 908\u2013921 (2015)","journal-title":"IEEE\/ACM Trans. Networking (TON)"},{"issue":"5","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1109\/TNET.2012.2232111","volume":"21","author":"PK Agarwal","year":"2013","unstructured":"Agarwal, P.K., Efrat, A., Ganjugunte, S.K., Hay, D., Sankararaman, S., Zussman, G.: The resilience of WDM networks to probabilistic geographical failures. IEEE\/ACM Trans. Networking 21(5), 1525\u20131538 (2013)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"5","key":"10_CR9","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/MCOM.2014.6815917","volume":"52","author":"B Mukherjee","year":"2014","unstructured":"Mukherjee, B., Habib, M.F., Dikbiyik, F.: Network adaptability from disaster disruptions and cascading failures. IEEE Commun. Magazine 52(5), 230\u2013238 (2014)","journal-title":"IEEE Commun. Magazine"},{"issue":"9","key":"10_CR10","doi-asserted-by":"publisher","first-page":"2336","DOI":"10.1109\/TLA.2018.8789553","volume":"17","author":"NA Boettcher","year":"2018","unstructured":"Boettcher, N.A., Prieto, Y., Restrepo, S.E., Pezoa, J.E.: Resilient multiculture network design in the presence of exploit-triggered correlated failures. IEEE Latin Am. Trans. 17(9), 2336\u20132344 (2018)","journal-title":"IEEE Latin Am. Trans."},{"issue":"6","key":"10_CR11","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TNET.2011.2128879","volume":"19","author":"S Neumayer","year":"2011","unstructured":"Neumayer, S., Zussman, G., Cohen, R., Modiano, E.: Assessing the vulnerability of the fiber infrastructure to disasters. IEEE\/ACM Trans. Networking 19(6), 1610\u20131623 (2011)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.comnet.2015.11.025","volume":"94","author":"S Neumayer","year":"2016","unstructured":"Neumayer, S., Modiano, E.: Network reliability under geographically correlated line and disk failure models. Comput. Netw. 94, 14\u201328 (2016)","journal-title":"Comput. Netw."},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Agarwal, P.K., Efrat, A., Ganjugunte, S.K., Hay, D., Sankararaman, S., Zussman, G.: Network vulnerability to single, multiple, and probabilistic physical attacks. In: Military Communications Conference (MILCOM), pp. 1824\u20131829. IEEE, United States (2010). https:\/\/doi.org\/10.1109\/MILCOM.2010.5679556","DOI":"10.1109\/MILCOM.2010.5679556"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Iqbal, F., Kuipers, F.A.: Disjoint paths in networks. In: Wiley Encyclopedia of Electrical and Electronics Engineering, pp. 1\u201311. Wiley, (1999). https:\/\/doi.org\/10.1002\/net.3230040204","DOI":"10.1002\/net.3230040204"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/0020-0190(91)90030-L","volume":"37","author":"S Skyum","year":"1991","unstructured":"Skyum, S.: A simple algorithm for computing the smallest enclosing circle. Inf. Process. Lett. 37(3), 121\u2013125 (1991)","journal-title":"Inf. Process. Lett."},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Zeng, Y., Zheng, G.: Delay-bounded and robust routing protocol for emergency applications using wireless sensor networks. In: 2nd International Conference on Advanced Computer Control (ICACC 2010), vol. 4, pp. 37\u201341. IEEE, China (2010). https:\/\/doi.org\/10.1109\/ICACC.2010.5487268","DOI":"10.1109\/ICACC.2010.5487268"},{"key":"10_CR17","unstructured":"NASA\u2019s Moderate Resolution Imaging Spectroradiometer (MODIS), Active Fire Data. https:\/\/earthdata.nasa.gov\/earth-observation-data\/near-real-time\/firms\/active-fire-data. Accessed 10 July 2018"},{"key":"10_CR18","unstructured":"The Internet Topology Zoo Homepage. http:\/\/www.topology-zoo.org. Accessed 07 Dec 2018"},{"key":"10_CR19","unstructured":"Data World, Author\u2019s Homepage. https:\/\/data.world\/nicoboettcher\/internet-zoo-topologies. Accessed 07 Dec 2018"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32169-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:17:29Z","timestamp":1696119449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-32169-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030321680","9783030321697"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32169-7_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itdrr.unwe.bg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}